SlideShare a Scribd company logo
1 of 7
Download to read offline
BCI3005 Digital Watermarking and Steganography
L T P J C
3 0 0 4 4
Objectives
1. To develop an understanding of digital watermarking and steganography basics,
various approaches, characteristics and application domains
2. To apply digital watermarking as an authentication tool for distribution of content
over the Internet and steganography techniques for covert communication
3. To understand the basics of the counter measures like steganalysis for assessing the
data hiding methods
4. To enable to evaluate and choose appropriate data hiding technique based on a
multitude of security factors
Expected Outcome
After completion of this course, the student shall be able to:
1. Describe watermarking and steganography fundamental concepts and principles.
2. Identify and assess different types of data hiding techniques in various image
formats like GIF, BMP etc., and various data hiding methods like LSB, EzStego,
OutGuess, and F5.
3. Describe the block codes and its usage for covert communication
4. Demonstrate the use of watermarking for copyright protection and steganography
for secret communication in various digital media
5. Design and implement efficient data hiding methods
6. Assess the strength of any data hiding algorithm against steganalysis techniques.
Student Learning
Outcome
1) Having an ability to apply mathematics and science in engineering applications
2) Having a clear understanding of the subject related concepts and of contemporary
issues
10) Having a clear understanding of professional and ethical responsibility
14) Having an ability to design and conduct experiments, as well as to analyse and
interpret data
15) Having an ability to use techniques, skills and modern engineering tools
necessary for engineering practice
Proceedings of the 44th Academic Council [16.3.2017]
Module Topics L Hrs SLO
1 DATA HIDING - Relationship between Watermarking and Steganography.
Digital Watermarking Basics: Models of Watermarking, Basic Message Coding,
Error Coding. Digital Watermarking Theoretic Aspects: Mutual Information and
Channel Capacity, Designing a Good Digital Mark, Theoretical Analysis of
Digital Watermarking Types of Watermarking Fragile, Semi-Fragile.
5 1,2
2 SPREAD SPECTRUM WATERMARKING - Transform Domain
Watermarking, Quantization Watermarking. Protocols: Buyer Seller
Watermarking Protocols, Efficient and Anonymous Buyer-Seller Watermarking
Protocol
5 1,2
3 STEGANOGRAPHY Introduction - Text Steganography Image
Steganography: Data Hiding in Raw (BMP) Images - LSB (Least Significant Bit)
Embedding - Data Hiding by Mimicking Device Noise (Stochastic Modulation).
Data Hiding in Palette (GIF) Images - Palette Formats (GIF) - Hiding by
Decreasing Colour Depth, Gifshuffle, - Optimal Palette Parity Assignment. Data
Hiding in JPEG Images - JPEG Format - J-Steg Data Hiding Algorithm
Hiding in Spatial Domain Hiding in Transform Domain Image Quality
Metrics
8 1,10
4 AUDIO STEGANOGRAPHY - Temporal Domain Techniques - Low-Bit
Encoding - Echo Hiding - Hiding in Silence Intervals. Transform Domain
Hiding Techniques - Magnitude Spectrum - Tone Insertion - Phase Coding -
Amplitude Coding - Cepstral Domain Codecs Domain: Codebook
Modification Bit stream Hiding Audio Quality Metrics
6 1,10
5 VIDEO STEGANOGRAPHY- Introduction Video Streams - Substitution-
Based Techniques - Transform Domain Techniques - Adaptive Techniques -
Format-Based Techniques - Cover Generation Techniques Video Quality
Metrics - Perceptual Transparency Analysis - Robustness against Compression -
Robustness against Manipulation
6 1,2
6 WET PAPER CODES - Random Linear Codes - LT Codes - Perturbed
Quantization, Matrix Embedding - Matrix Embedding Theorem - Binary
6 1,2
Proceedings of the 44th Academic Council [16.3.2017]
Knowledge Areas that contain topics and learning outcomes covered in the course
Knowledge Area Total Hours of Coverage
Hamming Codes, Q-Ary Case Random Linear Codes for Large Payloads
7 STEGANALYSIS - Principles, Approaches, ROC Analysis - Sample Pairs
Analysis - Attacks using Histogram Characteristic Function - Spatial Domain
Steganalysis using Higher Order Statistics - Steganalysis using Resampling
Calibration - Feature Selection - Calibration by Recompression
7 2,17
8 Contemporary Issues (To be handled by experts from industry)
2 2
Project
Generally a team project [2 to 3members]
Innovative idea should be attempted
Sample projects include:
a. LSB, PVD, DCT, DWT data hiding
b. Claiming ownership of digital entity
c. Tracing the digital theft in cyber space
d. Wet paper coding
e. Universal steganalysis based on histogram features, higher order
statistical features
f. Target steganalysis
g. Data hiding in different image types png, GIF, jpeg, bmp etc.
h. Reversible data hiding in images
i. Steganography in transform domain DCT, DWT, Curvelet etc
j. Steganography in encrypted images Two layer security
60[Non
Contact]
14
Text Books
1. I. J. Cox, M. L. Miller, J. A. Bloom, T. Kalker, and J. Fridrich, Digital Watermarking and Steganography, 2nd Ed.
Amsterdam: Morgan Kaufmann Publishers In, 2007. (ISBN No. : 978-0-12-372585-1 )
2. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge: Cambridge
University Press, 2009. (ISBN No.: 978-0-52-119019-0 )
Reference Books
1. R. C. Gonzalez, R. E. Woods, D. J. Czitrom, and S. Armitage, Digital Image Processing, 3rd Ed. United States:
Prentice Hall, 2007. (ISBN No.: 978-0-13-168728-8 )
2. P. Wayner, Disappearing Cryptography: Information hiding: Steganography and Watermarking, 3rd ed.
Amsterdam: Morgan Kaufmann Publishers In, 2008. (ISBN No. : 978-0-08-092270-6 )
3. M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and applications of digital Watermarking and
content protection, 2nd Ed. Boston, MA: Artech House Publishers, 2003. (ISBN No.: 978-1-58-053664-6 )
Proceedings of the 44th Academic Council [16.3.2017]
CE: SEC (Information Security) 45
Body of Knowledge coverage
KA Knowledge Unit Topics Covered (Refer ACM Course Page) Hours
CE:
SEC
History, overview and
principles
Module 1 - Data hiding history - Relationship between
watermarking and steganography. Digital Watermarking
Basics: Models of Watermarking, Basic Message Coding,
Error Coding. Digital Watermarking Theoretic Aspects:
Mutual information and channel capacity, Designing a
good digital mark, Theoretical analysis of digital
watermarking
5
CE:
SEC
Relevant tools, standards,
and/or engineering
constraints
Module 2 - Spread Spectrum Watermarking, Transform
Domain Watermarking, Quantization Watermarking.
Protocols: Buyer seller watermarking protocols, Efficient
and Anonymous Buyer-Seller Watermarking Protocol
6
CE:
SEC
Data security and integrity Module 3 Steganography Introduction - Text
steganography Image steganography: Data hiding in raw
(BMP) images - LSB (least significant bit) embedding - -
Data hiding by mimicking device noise (Stochastic
Modulation). Data hiding in palette (GIF) images -
Palette formats (GIF) - Hiding by decreasing colour depth,
GIFshuffle, - optimal palette parity assignment. Data
hiding in JPEG images - JPEG format - J-Steg data
hiding algorithm Hiding in spatial domain Hiding in
transform domain Image Quality Metrics
Module 4 - Audio steganography: Temporal domain
Techniques - Low-bit encoding - Echo hiding - Hiding
in silence intervals. Transform Domain Hiding Techniques
- Magnitude spectrum - Tone insertion - Phase coding -
Amplitude coding - Cepstral domain Codecs domain:
Codebook modification Bitstream hiding Audio
Quality Metrics
Module 5 - Video steganography: Introduction Video
streams - Substitution-based techniques - Transform
domain techniques - Adaptive techniques - Format-based
techniques - Cover generation techniques Video Quality
14
Proceedings of the 44th Academic Council [16.3.2017]
Metrics - Perceptual transparency analysis - Robustness
against compression - Robustness against manipulation
CE:
SEC
Secret and public key
cryptography
Module 6 - Wet paper codes - Random linear codes - LT
codes - Perturbed quantization, Matrix embedding - Matrix
embedding theorem - Binary Hamming codes, q-ary case
random linear codes for large payloads
11
CE:
SEC
Side Channel Attacks Module 7 - Principles, Approaches, ROC Analysis -
Sample pairs analysis - Attacks using histogram
characteristic function - Spatial domain steganalysis using
higher order statistics - Steganalysis using resampling
calibration - feature selection - Calibration by
recompression
7
Where does the course fit in the curriculum?
This course is a
Core Course.
Suitable from 2nd semester onwards.
Programming knowledge in C/ Java
What is covered in the course?
Part I: Watermarking Fundamentals
This section introduces the basic concepts of digital watermarking, models, coding, types and approaches of
watermarking. It also describes the buyer-seller protocol for general watermarking scheme.
Part II: Image Steganography
This section briefs about the various techniques of image steganography methods, hiding in raw images,
compressed images and palette images. It also covers the spatial and transform domain data hiding methods
in detail.
Part III: Audio Steganography
This section details the various audio steganography techniques like temporal domain and transform domain
techniques. It also discusses the audio quality metrics used to assess the strength of audio steganography
techniques.
Part IV: Video Steganography
This section briefs about the various video steganography techniques like substitution-based techniques,
transform domain techniques, adaptive techniques, format-based techniques, cover generation techniques. It
also discusses the video quality metrics used to assess the strength of video steganography techniques.
Part V: Steganalysis
This section deals with various steganalysis methods, universal, blind, histogram based attacks, higher order
statistical features, calibrated features and the ways to express the classification like ROC.
What is the format of the course?
Proceedings of the 44th Academic Council [16.3.2017]
This course is designed with 3 hours of lecture every week, 60 minutes of video/reading instructional material
per week. Generally this course should have the combination of lectures, in-class discussion, case studies,
guest-lectures, mandatory off-class reading material, quizzes.
How are students assessed?
Students are assessed on a combination group activities, classroom discussion, projects, and
continuous, final assessment tests.
Additional weightage will be given based on their rank in developing applications during lab.
Students can earn additional weightage based on certificate of completion of a related MOOC
course.
Session wise plan
Sl.
No
Topics Covered Class
Hour
Lab
Hour
Levels of
mastery
Reference
Book
1 Data hiding history - Relationship between
watermarking and steganography. Digital
Watermarking Basics: Models of Watermarking, Basic
Message Coding, Error Coding.
2 Familiarity T1, R32
2 Digital Watermarking Theoretic Aspects: Mutual
information and channel capacity, Designing a good
digital mark, Theoretical analysis of digital
watermarking
3 Familiarity T1, R3
3 Spread Spectrum Watermarking, Transform Domain
Watermarking, Quantization Watermarking.
3 Familiarity T1, R3
4 Protocols: Buyer seller watermarking protocols,
Efficient and Anonymous Buyer-Seller Watermarking
Protocol
2 Familiarity T1, R3
5 Steganography Introduction - Text steganography
Image steganography: Data hiding in raw (BMP)
images - LSB (least significant bit) embedding - Data
hiding by mimicking device noise (Stochastic
Modulation).
3 Familiarity T2, R2
6 Data hiding in palette (GIF) images - Palette formats
(GIF) - Hiding by decreasing colour depth,
GIFshuffle, - optimal palette parity assignment.
2 Usage T2, R2
7 Data hiding in JPEG images - JPEG format - J-Steg
data hiding algorithm Hiding in spatial domain
Hiding in transform domain
2 Familiarity T2
8 Image Quality Metrics 1 Usage T2
9 Audio steganography: Temporal domain Techniques
- Low-bit encoding - Echo hiding - Hiding in
2 Usage T2, R2
Proceedings of the 44th Academic Council [16.3.2017]
silence intervals.
10 Transform Domain Hiding Techniques - Magnitude
spectrum - Tone insertion - Phase coding -
Amplitude coding - Cepstral domain Codecs
domain: Codebook modification Bitstream hiding
3 Usage T2, R2
11 Audio Quality Metrics 1 Familiarity T2
12 Video steganography: Introduction Video streams -
Substitution-based techniques - Transform domain
techniques
2 Familiarity T2
13 Adaptive techniques - Format-based techniques -
Cover generation techniques
2 Familiarity T2
14 Video Quality Metrics - Perceptual transparency
analysis - Robustness against compression -
Robustness against manipulation
2 Familiarity T2
15 Wet paper codes - Random linear codes - LT codes -
Perturbed quantization, Matrix embedding
3 Familiarity T2
16 Matrix embedding theorem - Binary Hamming codes,
q-ary case random linear codes for large payloads
3 Familiarity T2
17 Steganalysis - Principles, Approaches, ROC analysis,
Sample pairs analysis
2 Assessment T2
18 Attacks using histogram characteristic function -
Spatial domain steganalysis using higher order
statistics
2 Familiarity T2
19 Steganalysis using resampling calibration - feature
selection - Calibration by recompression
3
Familiarity T2, R2
20 Contemporary Issues 2 Familiarity
Proceedings of the 44th Academic Council [16.3.2017]

More Related Content

What's hot

Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101rahat ali
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Steganography
SteganographySteganography
SteganographySonam M
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 

What's hot (20)

Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 

Similar to digital-watermarking-and-steganography syllabus . . . . . . .

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Simulation based Performance Analysis of Histogram Shifting Method on Various...
Simulation based Performance Analysis of Histogram Shifting Method on Various...Simulation based Performance Analysis of Histogram Shifting Method on Various...
Simulation based Performance Analysis of Histogram Shifting Method on Various...ijtsrd
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 

Similar to digital-watermarking-and-steganography syllabus . . . . . . . (20)

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
R04405103106
R04405103106R04405103106
R04405103106
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Simulation based Performance Analysis of Histogram Shifting Method on Various...
Simulation based Performance Analysis of Histogram Shifting Method on Various...Simulation based Performance Analysis of Histogram Shifting Method on Various...
Simulation based Performance Analysis of Histogram Shifting Method on Various...
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
G017444651
G017444651G017444651
G017444651
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
O017429398
O017429398O017429398
O017429398
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

digital-watermarking-and-steganography syllabus . . . . . . .

  • 1. BCI3005 Digital Watermarking and Steganography L T P J C 3 0 0 4 4 Objectives 1. To develop an understanding of digital watermarking and steganography basics, various approaches, characteristics and application domains 2. To apply digital watermarking as an authentication tool for distribution of content over the Internet and steganography techniques for covert communication 3. To understand the basics of the counter measures like steganalysis for assessing the data hiding methods 4. To enable to evaluate and choose appropriate data hiding technique based on a multitude of security factors Expected Outcome After completion of this course, the student shall be able to: 1. Describe watermarking and steganography fundamental concepts and principles. 2. Identify and assess different types of data hiding techniques in various image formats like GIF, BMP etc., and various data hiding methods like LSB, EzStego, OutGuess, and F5. 3. Describe the block codes and its usage for covert communication 4. Demonstrate the use of watermarking for copyright protection and steganography for secret communication in various digital media 5. Design and implement efficient data hiding methods 6. Assess the strength of any data hiding algorithm against steganalysis techniques. Student Learning Outcome 1) Having an ability to apply mathematics and science in engineering applications 2) Having a clear understanding of the subject related concepts and of contemporary issues 10) Having a clear understanding of professional and ethical responsibility 14) Having an ability to design and conduct experiments, as well as to analyse and interpret data 15) Having an ability to use techniques, skills and modern engineering tools necessary for engineering practice Proceedings of the 44th Academic Council [16.3.2017]
  • 2. Module Topics L Hrs SLO 1 DATA HIDING - Relationship between Watermarking and Steganography. Digital Watermarking Basics: Models of Watermarking, Basic Message Coding, Error Coding. Digital Watermarking Theoretic Aspects: Mutual Information and Channel Capacity, Designing a Good Digital Mark, Theoretical Analysis of Digital Watermarking Types of Watermarking Fragile, Semi-Fragile. 5 1,2 2 SPREAD SPECTRUM WATERMARKING - Transform Domain Watermarking, Quantization Watermarking. Protocols: Buyer Seller Watermarking Protocols, Efficient and Anonymous Buyer-Seller Watermarking Protocol 5 1,2 3 STEGANOGRAPHY Introduction - Text Steganography Image Steganography: Data Hiding in Raw (BMP) Images - LSB (Least Significant Bit) Embedding - Data Hiding by Mimicking Device Noise (Stochastic Modulation). Data Hiding in Palette (GIF) Images - Palette Formats (GIF) - Hiding by Decreasing Colour Depth, Gifshuffle, - Optimal Palette Parity Assignment. Data Hiding in JPEG Images - JPEG Format - J-Steg Data Hiding Algorithm Hiding in Spatial Domain Hiding in Transform Domain Image Quality Metrics 8 1,10 4 AUDIO STEGANOGRAPHY - Temporal Domain Techniques - Low-Bit Encoding - Echo Hiding - Hiding in Silence Intervals. Transform Domain Hiding Techniques - Magnitude Spectrum - Tone Insertion - Phase Coding - Amplitude Coding - Cepstral Domain Codecs Domain: Codebook Modification Bit stream Hiding Audio Quality Metrics 6 1,10 5 VIDEO STEGANOGRAPHY- Introduction Video Streams - Substitution- Based Techniques - Transform Domain Techniques - Adaptive Techniques - Format-Based Techniques - Cover Generation Techniques Video Quality Metrics - Perceptual Transparency Analysis - Robustness against Compression - Robustness against Manipulation 6 1,2 6 WET PAPER CODES - Random Linear Codes - LT Codes - Perturbed Quantization, Matrix Embedding - Matrix Embedding Theorem - Binary 6 1,2 Proceedings of the 44th Academic Council [16.3.2017]
  • 3. Knowledge Areas that contain topics and learning outcomes covered in the course Knowledge Area Total Hours of Coverage Hamming Codes, Q-Ary Case Random Linear Codes for Large Payloads 7 STEGANALYSIS - Principles, Approaches, ROC Analysis - Sample Pairs Analysis - Attacks using Histogram Characteristic Function - Spatial Domain Steganalysis using Higher Order Statistics - Steganalysis using Resampling Calibration - Feature Selection - Calibration by Recompression 7 2,17 8 Contemporary Issues (To be handled by experts from industry) 2 2 Project Generally a team project [2 to 3members] Innovative idea should be attempted Sample projects include: a. LSB, PVD, DCT, DWT data hiding b. Claiming ownership of digital entity c. Tracing the digital theft in cyber space d. Wet paper coding e. Universal steganalysis based on histogram features, higher order statistical features f. Target steganalysis g. Data hiding in different image types png, GIF, jpeg, bmp etc. h. Reversible data hiding in images i. Steganography in transform domain DCT, DWT, Curvelet etc j. Steganography in encrypted images Two layer security 60[Non Contact] 14 Text Books 1. I. J. Cox, M. L. Miller, J. A. Bloom, T. Kalker, and J. Fridrich, Digital Watermarking and Steganography, 2nd Ed. Amsterdam: Morgan Kaufmann Publishers In, 2007. (ISBN No. : 978-0-12-372585-1 ) 2. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge: Cambridge University Press, 2009. (ISBN No.: 978-0-52-119019-0 ) Reference Books 1. R. C. Gonzalez, R. E. Woods, D. J. Czitrom, and S. Armitage, Digital Image Processing, 3rd Ed. United States: Prentice Hall, 2007. (ISBN No.: 978-0-13-168728-8 ) 2. P. Wayner, Disappearing Cryptography: Information hiding: Steganography and Watermarking, 3rd ed. Amsterdam: Morgan Kaufmann Publishers In, 2008. (ISBN No. : 978-0-08-092270-6 ) 3. M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and applications of digital Watermarking and content protection, 2nd Ed. Boston, MA: Artech House Publishers, 2003. (ISBN No.: 978-1-58-053664-6 ) Proceedings of the 44th Academic Council [16.3.2017]
  • 4. CE: SEC (Information Security) 45 Body of Knowledge coverage KA Knowledge Unit Topics Covered (Refer ACM Course Page) Hours CE: SEC History, overview and principles Module 1 - Data hiding history - Relationship between watermarking and steganography. Digital Watermarking Basics: Models of Watermarking, Basic Message Coding, Error Coding. Digital Watermarking Theoretic Aspects: Mutual information and channel capacity, Designing a good digital mark, Theoretical analysis of digital watermarking 5 CE: SEC Relevant tools, standards, and/or engineering constraints Module 2 - Spread Spectrum Watermarking, Transform Domain Watermarking, Quantization Watermarking. Protocols: Buyer seller watermarking protocols, Efficient and Anonymous Buyer-Seller Watermarking Protocol 6 CE: SEC Data security and integrity Module 3 Steganography Introduction - Text steganography Image steganography: Data hiding in raw (BMP) images - LSB (least significant bit) embedding - - Data hiding by mimicking device noise (Stochastic Modulation). Data hiding in palette (GIF) images - Palette formats (GIF) - Hiding by decreasing colour depth, GIFshuffle, - optimal palette parity assignment. Data hiding in JPEG images - JPEG format - J-Steg data hiding algorithm Hiding in spatial domain Hiding in transform domain Image Quality Metrics Module 4 - Audio steganography: Temporal domain Techniques - Low-bit encoding - Echo hiding - Hiding in silence intervals. Transform Domain Hiding Techniques - Magnitude spectrum - Tone insertion - Phase coding - Amplitude coding - Cepstral domain Codecs domain: Codebook modification Bitstream hiding Audio Quality Metrics Module 5 - Video steganography: Introduction Video streams - Substitution-based techniques - Transform domain techniques - Adaptive techniques - Format-based techniques - Cover generation techniques Video Quality 14 Proceedings of the 44th Academic Council [16.3.2017]
  • 5. Metrics - Perceptual transparency analysis - Robustness against compression - Robustness against manipulation CE: SEC Secret and public key cryptography Module 6 - Wet paper codes - Random linear codes - LT codes - Perturbed quantization, Matrix embedding - Matrix embedding theorem - Binary Hamming codes, q-ary case random linear codes for large payloads 11 CE: SEC Side Channel Attacks Module 7 - Principles, Approaches, ROC Analysis - Sample pairs analysis - Attacks using histogram characteristic function - Spatial domain steganalysis using higher order statistics - Steganalysis using resampling calibration - feature selection - Calibration by recompression 7 Where does the course fit in the curriculum? This course is a Core Course. Suitable from 2nd semester onwards. Programming knowledge in C/ Java What is covered in the course? Part I: Watermarking Fundamentals This section introduces the basic concepts of digital watermarking, models, coding, types and approaches of watermarking. It also describes the buyer-seller protocol for general watermarking scheme. Part II: Image Steganography This section briefs about the various techniques of image steganography methods, hiding in raw images, compressed images and palette images. It also covers the spatial and transform domain data hiding methods in detail. Part III: Audio Steganography This section details the various audio steganography techniques like temporal domain and transform domain techniques. It also discusses the audio quality metrics used to assess the strength of audio steganography techniques. Part IV: Video Steganography This section briefs about the various video steganography techniques like substitution-based techniques, transform domain techniques, adaptive techniques, format-based techniques, cover generation techniques. It also discusses the video quality metrics used to assess the strength of video steganography techniques. Part V: Steganalysis This section deals with various steganalysis methods, universal, blind, histogram based attacks, higher order statistical features, calibrated features and the ways to express the classification like ROC. What is the format of the course? Proceedings of the 44th Academic Council [16.3.2017]
  • 6. This course is designed with 3 hours of lecture every week, 60 minutes of video/reading instructional material per week. Generally this course should have the combination of lectures, in-class discussion, case studies, guest-lectures, mandatory off-class reading material, quizzes. How are students assessed? Students are assessed on a combination group activities, classroom discussion, projects, and continuous, final assessment tests. Additional weightage will be given based on their rank in developing applications during lab. Students can earn additional weightage based on certificate of completion of a related MOOC course. Session wise plan Sl. No Topics Covered Class Hour Lab Hour Levels of mastery Reference Book 1 Data hiding history - Relationship between watermarking and steganography. Digital Watermarking Basics: Models of Watermarking, Basic Message Coding, Error Coding. 2 Familiarity T1, R32 2 Digital Watermarking Theoretic Aspects: Mutual information and channel capacity, Designing a good digital mark, Theoretical analysis of digital watermarking 3 Familiarity T1, R3 3 Spread Spectrum Watermarking, Transform Domain Watermarking, Quantization Watermarking. 3 Familiarity T1, R3 4 Protocols: Buyer seller watermarking protocols, Efficient and Anonymous Buyer-Seller Watermarking Protocol 2 Familiarity T1, R3 5 Steganography Introduction - Text steganography Image steganography: Data hiding in raw (BMP) images - LSB (least significant bit) embedding - Data hiding by mimicking device noise (Stochastic Modulation). 3 Familiarity T2, R2 6 Data hiding in palette (GIF) images - Palette formats (GIF) - Hiding by decreasing colour depth, GIFshuffle, - optimal palette parity assignment. 2 Usage T2, R2 7 Data hiding in JPEG images - JPEG format - J-Steg data hiding algorithm Hiding in spatial domain Hiding in transform domain 2 Familiarity T2 8 Image Quality Metrics 1 Usage T2 9 Audio steganography: Temporal domain Techniques - Low-bit encoding - Echo hiding - Hiding in 2 Usage T2, R2 Proceedings of the 44th Academic Council [16.3.2017]
  • 7. silence intervals. 10 Transform Domain Hiding Techniques - Magnitude spectrum - Tone insertion - Phase coding - Amplitude coding - Cepstral domain Codecs domain: Codebook modification Bitstream hiding 3 Usage T2, R2 11 Audio Quality Metrics 1 Familiarity T2 12 Video steganography: Introduction Video streams - Substitution-based techniques - Transform domain techniques 2 Familiarity T2 13 Adaptive techniques - Format-based techniques - Cover generation techniques 2 Familiarity T2 14 Video Quality Metrics - Perceptual transparency analysis - Robustness against compression - Robustness against manipulation 2 Familiarity T2 15 Wet paper codes - Random linear codes - LT codes - Perturbed quantization, Matrix embedding 3 Familiarity T2 16 Matrix embedding theorem - Binary Hamming codes, q-ary case random linear codes for large payloads 3 Familiarity T2 17 Steganalysis - Principles, Approaches, ROC analysis, Sample pairs analysis 2 Assessment T2 18 Attacks using histogram characteristic function - Spatial domain steganalysis using higher order statistics 2 Familiarity T2 19 Steganalysis using resampling calibration - feature selection - Calibration by recompression 3 Familiarity T2, R2 20 Contemporary Issues 2 Familiarity Proceedings of the 44th Academic Council [16.3.2017]