Cryptography is the science of using mathematics to encrypt and decrypt data. This presentation explains about the cryptography, its history, types i.e. symmetric and asymmetric cryptography.
Cryptography is the science of using mathematics to encrypt and decrypt data. This presentation explains about the cryptography, its history, types i.e. symmetric and asymmetric cryptography.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
In this presentation both the major domains of information security is explored.
1) Watermarking
2) Steganography
factors affecting them,applications,various techiniques are discussed in the presentation.
This presentation provides an introduction to the digital watermarking topic, it also shows the types of watermarking, watermarking desired properties and the related applications.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the ElGamal Cryptosystem.
In this presentation both the major domains of information security is explored.
1) Watermarking
2) Steganography
factors affecting them,applications,various techiniques are discussed in the presentation.
This presentation provides an introduction to the digital watermarking topic, it also shows the types of watermarking, watermarking desired properties and the related applications.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Simulation based Performance Analysis of Histogram Shifting Method on Various...ijtsrd
In this paper we have simulated and analyzed histogram shifting method on different types of cover images. Secret image which is used to hide in cover image is called payload. We have analyzed this algorithm in MATLAB simulation tool. This analysis is performed to find out the performance of this method on different types of cover images. We have analyzed this to find out how much accuracy can we get when extracting payload from cover image. We have computed peak signal to noise ratio, mean square error. Garima Sharma | Vipra Bohara | Laxmi Narayan Balai"Simulation based Performance Analysis of Histogram Shifting Method on Various Cover Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14139.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/14139/simulation-based-performance-analysis-of-histogram-shifting-method-on-various-cover-images/garima-sharma
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
ABSTRACT
Image usage over the internet becomes more and more important each day. Over 3 billion images are shared each day over the internet which raise a concern about how to protect images copyrights? Or how to utilize image sharing experience? This paper proposes a new robust image watermarking algorithm based on compressed sensing (CS) and quantization index modulation (QIM) watermark embedding. The algorithm capitalizes on the CS to compress and encrypt images jointly with Entropy Coding, Arnold Cat Map, Pseudo-random numbers and Advanced Encryption Standard (AES). Our proposed algorithm works under the JPEG standard umbrella. Watermark embedding is done in 3 different locations inside the image using QIM. Those locations differ with each 8-by-8 image block. Choosing which combination of coefficients to be used in QIM watermark embedding depends on selecting a combination from combinations table, which is generated at the same time with projection matrices using a 10-digits Pseudorandom number secret key SK1. After quantization phase, the algorithm shuffles image blocks using Arnold’s Cat Map with a 10-digits Pseudo-random number secret key SK2, followed by a unique method for splitting every 8x8 block into two unequal parts. Part number one will act as the host for two QIM watermarks then goes through encoding phase using Run-Length Encoding (RLE) followed by Huffman Encoding, while part number two goes through sparse watermark embedding followed by a third QIM watermark embedding and compression phase using CS, then Huffman encoder is used to encode this part. The algorithm aims to combine image watermarking, compression and encryption capabilities in one algorithm while balancing how those capabilities works with each other to achieve significant improvement in terms of image watermarking, compression and encryption. 15 different images usually used in image processing benchmarking were used for testing the algorithm capabilities and experiments show that our proposed algorithm achieves robust watermarking jointly with encryption and compression under the JPEG standard framework.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Launch Your Streaming Platforms in MinutesRoshan Dwivedi
The claim of launching a streaming platform in minutes might be a bit of an exaggeration, but there are services that can significantly streamline the process. Here's a breakdown:
Pros of Speedy Streaming Platform Launch Services:
No coding required: These services often use drag-and-drop interfaces or pre-built templates, eliminating the need for programming knowledge.
Faster setup: Compared to building from scratch, these platforms can get you up and running much quicker.
All-in-one solutions: Many services offer features like content management systems (CMS), video players, and monetization tools, reducing the need for multiple integrations.
Things to Consider:
Limited customization: These platforms may offer less flexibility in design and functionality compared to custom-built solutions.
Scalability: As your audience grows, you might need to upgrade to a more robust platform or encounter limitations with the "quick launch" option.
Features: Carefully evaluate which features are included and if they meet your specific needs (e.g., live streaming, subscription options).
Examples of Services for Launching Streaming Platforms:
Muvi [muvi com]
Uscreen [usencreen tv]
Alternatives to Consider:
Existing Streaming platforms: Platforms like YouTube or Twitch might be suitable for basic streaming needs, though monetization options might be limited.
Custom Development: While more time-consuming, custom development offers the most control and flexibility for your platform.
Overall, launching a streaming platform in minutes might not be entirely realistic, but these services can significantly speed up the process compared to building from scratch. Carefully consider your needs and budget when choosing the best option for you.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
1. BCI3005 Digital Watermarking and Steganography
L T P J C
3 0 0 4 4
Objectives
1. To develop an understanding of digital watermarking and steganography basics,
various approaches, characteristics and application domains
2. To apply digital watermarking as an authentication tool for distribution of content
over the Internet and steganography techniques for covert communication
3. To understand the basics of the counter measures like steganalysis for assessing the
data hiding methods
4. To enable to evaluate and choose appropriate data hiding technique based on a
multitude of security factors
Expected Outcome
After completion of this course, the student shall be able to:
1. Describe watermarking and steganography fundamental concepts and principles.
2. Identify and assess different types of data hiding techniques in various image
formats like GIF, BMP etc., and various data hiding methods like LSB, EzStego,
OutGuess, and F5.
3. Describe the block codes and its usage for covert communication
4. Demonstrate the use of watermarking for copyright protection and steganography
for secret communication in various digital media
5. Design and implement efficient data hiding methods
6. Assess the strength of any data hiding algorithm against steganalysis techniques.
Student Learning
Outcome
1) Having an ability to apply mathematics and science in engineering applications
2) Having a clear understanding of the subject related concepts and of contemporary
issues
10) Having a clear understanding of professional and ethical responsibility
14) Having an ability to design and conduct experiments, as well as to analyse and
interpret data
15) Having an ability to use techniques, skills and modern engineering tools
necessary for engineering practice
Proceedings of the 44th Academic Council [16.3.2017]
2. Module Topics L Hrs SLO
1 DATA HIDING - Relationship between Watermarking and Steganography.
Digital Watermarking Basics: Models of Watermarking, Basic Message Coding,
Error Coding. Digital Watermarking Theoretic Aspects: Mutual Information and
Channel Capacity, Designing a Good Digital Mark, Theoretical Analysis of
Digital Watermarking Types of Watermarking Fragile, Semi-Fragile.
5 1,2
2 SPREAD SPECTRUM WATERMARKING - Transform Domain
Watermarking, Quantization Watermarking. Protocols: Buyer Seller
Watermarking Protocols, Efficient and Anonymous Buyer-Seller Watermarking
Protocol
5 1,2
3 STEGANOGRAPHY Introduction - Text Steganography Image
Steganography: Data Hiding in Raw (BMP) Images - LSB (Least Significant Bit)
Embedding - Data Hiding by Mimicking Device Noise (Stochastic Modulation).
Data Hiding in Palette (GIF) Images - Palette Formats (GIF) - Hiding by
Decreasing Colour Depth, Gifshuffle, - Optimal Palette Parity Assignment. Data
Hiding in JPEG Images - JPEG Format - J-Steg Data Hiding Algorithm
Hiding in Spatial Domain Hiding in Transform Domain Image Quality
Metrics
8 1,10
4 AUDIO STEGANOGRAPHY - Temporal Domain Techniques - Low-Bit
Encoding - Echo Hiding - Hiding in Silence Intervals. Transform Domain
Hiding Techniques - Magnitude Spectrum - Tone Insertion - Phase Coding -
Amplitude Coding - Cepstral Domain Codecs Domain: Codebook
Modification Bit stream Hiding Audio Quality Metrics
6 1,10
5 VIDEO STEGANOGRAPHY- Introduction Video Streams - Substitution-
Based Techniques - Transform Domain Techniques - Adaptive Techniques -
Format-Based Techniques - Cover Generation Techniques Video Quality
Metrics - Perceptual Transparency Analysis - Robustness against Compression -
Robustness against Manipulation
6 1,2
6 WET PAPER CODES - Random Linear Codes - LT Codes - Perturbed
Quantization, Matrix Embedding - Matrix Embedding Theorem - Binary
6 1,2
Proceedings of the 44th Academic Council [16.3.2017]
3. Knowledge Areas that contain topics and learning outcomes covered in the course
Knowledge Area Total Hours of Coverage
Hamming Codes, Q-Ary Case Random Linear Codes for Large Payloads
7 STEGANALYSIS - Principles, Approaches, ROC Analysis - Sample Pairs
Analysis - Attacks using Histogram Characteristic Function - Spatial Domain
Steganalysis using Higher Order Statistics - Steganalysis using Resampling
Calibration - Feature Selection - Calibration by Recompression
7 2,17
8 Contemporary Issues (To be handled by experts from industry)
2 2
Project
Generally a team project [2 to 3members]
Innovative idea should be attempted
Sample projects include:
a. LSB, PVD, DCT, DWT data hiding
b. Claiming ownership of digital entity
c. Tracing the digital theft in cyber space
d. Wet paper coding
e. Universal steganalysis based on histogram features, higher order
statistical features
f. Target steganalysis
g. Data hiding in different image types png, GIF, jpeg, bmp etc.
h. Reversible data hiding in images
i. Steganography in transform domain DCT, DWT, Curvelet etc
j. Steganography in encrypted images Two layer security
60[Non
Contact]
14
Text Books
1. I. J. Cox, M. L. Miller, J. A. Bloom, T. Kalker, and J. Fridrich, Digital Watermarking and Steganography, 2nd Ed.
Amsterdam: Morgan Kaufmann Publishers In, 2007. (ISBN No. : 978-0-12-372585-1 )
2. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge: Cambridge
University Press, 2009. (ISBN No.: 978-0-52-119019-0 )
Reference Books
1. R. C. Gonzalez, R. E. Woods, D. J. Czitrom, and S. Armitage, Digital Image Processing, 3rd Ed. United States:
Prentice Hall, 2007. (ISBN No.: 978-0-13-168728-8 )
2. P. Wayner, Disappearing Cryptography: Information hiding: Steganography and Watermarking, 3rd ed.
Amsterdam: Morgan Kaufmann Publishers In, 2008. (ISBN No. : 978-0-08-092270-6 )
3. M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and applications of digital Watermarking and
content protection, 2nd Ed. Boston, MA: Artech House Publishers, 2003. (ISBN No.: 978-1-58-053664-6 )
Proceedings of the 44th Academic Council [16.3.2017]
4. CE: SEC (Information Security) 45
Body of Knowledge coverage
KA Knowledge Unit Topics Covered (Refer ACM Course Page) Hours
CE:
SEC
History, overview and
principles
Module 1 - Data hiding history - Relationship between
watermarking and steganography. Digital Watermarking
Basics: Models of Watermarking, Basic Message Coding,
Error Coding. Digital Watermarking Theoretic Aspects:
Mutual information and channel capacity, Designing a
good digital mark, Theoretical analysis of digital
watermarking
5
CE:
SEC
Relevant tools, standards,
and/or engineering
constraints
Module 2 - Spread Spectrum Watermarking, Transform
Domain Watermarking, Quantization Watermarking.
Protocols: Buyer seller watermarking protocols, Efficient
and Anonymous Buyer-Seller Watermarking Protocol
6
CE:
SEC
Data security and integrity Module 3 Steganography Introduction - Text
steganography Image steganography: Data hiding in raw
(BMP) images - LSB (least significant bit) embedding - -
Data hiding by mimicking device noise (Stochastic
Modulation). Data hiding in palette (GIF) images -
Palette formats (GIF) - Hiding by decreasing colour depth,
GIFshuffle, - optimal palette parity assignment. Data
hiding in JPEG images - JPEG format - J-Steg data
hiding algorithm Hiding in spatial domain Hiding in
transform domain Image Quality Metrics
Module 4 - Audio steganography: Temporal domain
Techniques - Low-bit encoding - Echo hiding - Hiding
in silence intervals. Transform Domain Hiding Techniques
- Magnitude spectrum - Tone insertion - Phase coding -
Amplitude coding - Cepstral domain Codecs domain:
Codebook modification Bitstream hiding Audio
Quality Metrics
Module 5 - Video steganography: Introduction Video
streams - Substitution-based techniques - Transform
domain techniques - Adaptive techniques - Format-based
techniques - Cover generation techniques Video Quality
14
Proceedings of the 44th Academic Council [16.3.2017]
5. Metrics - Perceptual transparency analysis - Robustness
against compression - Robustness against manipulation
CE:
SEC
Secret and public key
cryptography
Module 6 - Wet paper codes - Random linear codes - LT
codes - Perturbed quantization, Matrix embedding - Matrix
embedding theorem - Binary Hamming codes, q-ary case
random linear codes for large payloads
11
CE:
SEC
Side Channel Attacks Module 7 - Principles, Approaches, ROC Analysis -
Sample pairs analysis - Attacks using histogram
characteristic function - Spatial domain steganalysis using
higher order statistics - Steganalysis using resampling
calibration - feature selection - Calibration by
recompression
7
Where does the course fit in the curriculum?
This course is a
Core Course.
Suitable from 2nd semester onwards.
Programming knowledge in C/ Java
What is covered in the course?
Part I: Watermarking Fundamentals
This section introduces the basic concepts of digital watermarking, models, coding, types and approaches of
watermarking. It also describes the buyer-seller protocol for general watermarking scheme.
Part II: Image Steganography
This section briefs about the various techniques of image steganography methods, hiding in raw images,
compressed images and palette images. It also covers the spatial and transform domain data hiding methods
in detail.
Part III: Audio Steganography
This section details the various audio steganography techniques like temporal domain and transform domain
techniques. It also discusses the audio quality metrics used to assess the strength of audio steganography
techniques.
Part IV: Video Steganography
This section briefs about the various video steganography techniques like substitution-based techniques,
transform domain techniques, adaptive techniques, format-based techniques, cover generation techniques. It
also discusses the video quality metrics used to assess the strength of video steganography techniques.
Part V: Steganalysis
This section deals with various steganalysis methods, universal, blind, histogram based attacks, higher order
statistical features, calibrated features and the ways to express the classification like ROC.
What is the format of the course?
Proceedings of the 44th Academic Council [16.3.2017]
6. This course is designed with 3 hours of lecture every week, 60 minutes of video/reading instructional material
per week. Generally this course should have the combination of lectures, in-class discussion, case studies,
guest-lectures, mandatory off-class reading material, quizzes.
How are students assessed?
Students are assessed on a combination group activities, classroom discussion, projects, and
continuous, final assessment tests.
Additional weightage will be given based on their rank in developing applications during lab.
Students can earn additional weightage based on certificate of completion of a related MOOC
course.
Session wise plan
Sl.
No
Topics Covered Class
Hour
Lab
Hour
Levels of
mastery
Reference
Book
1 Data hiding history - Relationship between
watermarking and steganography. Digital
Watermarking Basics: Models of Watermarking, Basic
Message Coding, Error Coding.
2 Familiarity T1, R32
2 Digital Watermarking Theoretic Aspects: Mutual
information and channel capacity, Designing a good
digital mark, Theoretical analysis of digital
watermarking
3 Familiarity T1, R3
3 Spread Spectrum Watermarking, Transform Domain
Watermarking, Quantization Watermarking.
3 Familiarity T1, R3
4 Protocols: Buyer seller watermarking protocols,
Efficient and Anonymous Buyer-Seller Watermarking
Protocol
2 Familiarity T1, R3
5 Steganography Introduction - Text steganography
Image steganography: Data hiding in raw (BMP)
images - LSB (least significant bit) embedding - Data
hiding by mimicking device noise (Stochastic
Modulation).
3 Familiarity T2, R2
6 Data hiding in palette (GIF) images - Palette formats
(GIF) - Hiding by decreasing colour depth,
GIFshuffle, - optimal palette parity assignment.
2 Usage T2, R2
7 Data hiding in JPEG images - JPEG format - J-Steg
data hiding algorithm Hiding in spatial domain
Hiding in transform domain
2 Familiarity T2
8 Image Quality Metrics 1 Usage T2
9 Audio steganography: Temporal domain Techniques
- Low-bit encoding - Echo hiding - Hiding in
2 Usage T2, R2
Proceedings of the 44th Academic Council [16.3.2017]
7. silence intervals.
10 Transform Domain Hiding Techniques - Magnitude
spectrum - Tone insertion - Phase coding -
Amplitude coding - Cepstral domain Codecs
domain: Codebook modification Bitstream hiding
3 Usage T2, R2
11 Audio Quality Metrics 1 Familiarity T2
12 Video steganography: Introduction Video streams -
Substitution-based techniques - Transform domain
techniques
2 Familiarity T2
13 Adaptive techniques - Format-based techniques -
Cover generation techniques
2 Familiarity T2
14 Video Quality Metrics - Perceptual transparency
analysis - Robustness against compression -
Robustness against manipulation
2 Familiarity T2
15 Wet paper codes - Random linear codes - LT codes -
Perturbed quantization, Matrix embedding
3 Familiarity T2
16 Matrix embedding theorem - Binary Hamming codes,
q-ary case random linear codes for large payloads
3 Familiarity T2
17 Steganalysis - Principles, Approaches, ROC analysis,
Sample pairs analysis
2 Assessment T2
18 Attacks using histogram characteristic function -
Spatial domain steganalysis using higher order
statistics
2 Familiarity T2
19 Steganalysis using resampling calibration - feature
selection - Calibration by recompression
3
Familiarity T2, R2
20 Contemporary Issues 2 Familiarity
Proceedings of the 44th Academic Council [16.3.2017]