Türkçe | English
GRADUATE INSTITUTE of NATURAL and APPLIED SCIENCES / DEPARTMENT of SOFTWARE ENGINEERING
SOFTWARE ENGINEERING (MASTER) (WITH THESIS)
Course Catalog
http://www.katalog.ktu.edu.tr/DersBilgiPaketi/generalinfo.aspx?pid=4396&lang=1
Phone: +90 0462 +90 462 3778353
FBE
GRADUATE INSTITUTE of NATURAL and APPLIED SCIENCES / DEPARTMENT of SOFTWARE ENGINEERING / SOFTWARE ENGINEERING (MASTER) (WITH THESIS)
Katalog Ana Sayfa
  Katalog Ana Sayfa  KTÜ Ana Sayfa   Katalog Ana Sayfa
 
 

YZLM5100Mıltimedia Security and Forensics3+0+0ECTS:7.5
Year / SemesterFall Semester
Level of CourseSecond Cycle
Status Elective
DepartmentDEPARTMENT of SOFTWARE ENGINEERING
Prerequisites and co-requisitesNone
Mode of Delivery
Contact Hours14 weeks - 3 hours of lectures per week
LecturerDr. Öğr. Üyesi Asuman GÜNAY YILMAZ
Co-Lecturer
Language of instructionTurkish
Professional practise ( internship ) None
 
The aim of the course:
To understand the history of the secret writing, to carry out applications such as copyright protection and data validation by using watermarking methods in multimedia data such as video, audio and video, to communicate safely by hiding information in multimedia data such as image, audio, to authenticate the content of multimedia data with digital fingerprint, to detect the forgery in images and videos by forensic examination.
 
Programme OutcomesCTPOTOA
Upon successful completion of the course, the students will be able to :
PO - 1 : Ensure the security of multimedia data with digital watermarking1,3,61,3,
PO - 2 : Hide information to multimedia data.1,3,61,3,
PO - 3 : Provide security of multimedia data with digital fingerprint.1,3,61,3,
PO - 4 : Perform forensic examination of images and videos.1,3,61,3,
CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), PO : Learning Outcome

 
Contents of the Course
The history of secret writing, Image watermarking, Database watermarking, Audio watermarking, Video watermarking, Steganography, Methods of hiding lossy and lossless data in images, Hiding data into audio file, Security with digital fingerprint, Detection of copy-paste forgery in images and videos
 
Course Syllabus
 WeekSubjectRelated Notes / Files
 Week 1History of secret writing
 Week 2Introduction to digital watermarking
 Week 3Image watermarking
 Week 4Database watermarking
 Week 5Audio watermarking
 Week 6Video watermarking
 Week 7Digital watermark security
 Week 8Introduction to steganography
 Week 9Midterm Exam
 Week 10Methods of hiding lossless data in images
 Week 11Methods of hiding lossy data in images
 Week 12Data hiding in digital audio
 Week 13Security using digital fingerprint
 Week 14Detection of copy-paste forgery in images
 Week 15Detection of copy-paste forgery in videos
 Week 16Final Exam
 
Textbook / Material
1Multimedia Security, Frank Y. Shih, CRC Press, 2012.
 
Recommended Reading
1Digital Watermarking and Steganography-Fundamentals and Techniques, Frank Y. Shih, CRC Press, 2008.
2Data Hiding, Micheal Raggo, Chet Hosmer, Elsevier, 179 pages.
 
Method of Assessment
Type of assessmentWeek NoDate

Duration (hours)Weight (%)
Mid-term exam 9 3 30
Project 15 10
Homework/Assignment/Term-paper 3, 6 10
End-of-term exam 16 3 50
 
Student Work Load and its Distribution
Type of workDuration (hours pw)

No of weeks / Number of activity

Hours in total per term
Yüz yüze eğitim 3 14 42
Sınıf dışı çalışma 4 14 56
Arasınav için hazırlık 3 8 24
Arasınav 3 1 3
Ödev 4.5 4 18
Proje 4 6 24
Dönem sonu sınavı için hazırlık 3 6 18
Dönem sonu sınavı 3 1 3
Total work load188