|
YZLM5100 | Mıltimedia Security and Forensics | 3+0+0 | ECTS:7.5 | Year / Semester | Fall Semester | Level of Course | Second Cycle | Status | Elective | Department | DEPARTMENT of SOFTWARE ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | Dr. Öğr. Üyesi Asuman GÜNAY YILMAZ | Co-Lecturer | | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | To understand the history of the secret writing, to carry out applications such as copyright protection and data validation by using watermarking methods in multimedia data such as video, audio and video, to communicate safely by hiding information in multimedia data such as image, audio, to authenticate the content of multimedia data with digital fingerprint,
to detect the forgery in images and videos by forensic examination. |
Programme Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | PO - 1 : | Ensure the security of multimedia data with digital watermarking | 1,3,6 | 1,3, | PO - 2 : | Hide information to multimedia data. | 1,3,6 | 1,3, | PO - 3 : | Provide security of multimedia data with digital fingerprint. | 1,3,6 | 1,3, | PO - 4 : | Perform forensic examination of images and videos. | 1,3,6 | 1,3, | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), PO : Learning Outcome | |
The history of secret writing, Image watermarking, Database watermarking, Audio watermarking, Video watermarking, Steganography, Methods of hiding lossy and lossless data in images, Hiding data into audio file, Security with digital fingerprint, Detection of copy-paste forgery in images and videos |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | History of secret writing | | Week 2 | Introduction to digital watermarking | | Week 3 | Image watermarking | | Week 4 | Database watermarking | | Week 5 | Audio watermarking | | Week 6 | Video watermarking | | Week 7 | Digital watermark security | | Week 8 | Introduction to steganography | | Week 9 | Midterm Exam | | Week 10 | Methods of hiding lossless data in images | | Week 11 | Methods of hiding lossy data in images | | Week 12 | Data hiding in digital audio | | Week 13 | Security using digital fingerprint | | Week 14 | Detection of copy-paste forgery in images | | Week 15 | Detection of copy-paste forgery in videos | | Week 16 | Final Exam | | |
1 | Multimedia Security, Frank Y. Shih, CRC Press, 2012. | | |
1 | Digital Watermarking and Steganography-Fundamentals and Techniques, Frank Y. Shih, CRC Press, 2008. | | 2 | Data Hiding, Micheal Raggo, Chet Hosmer, Elsevier, 179 pages. | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | | 3 | 30 | Project | 15 | | | 10 | Homework/Assignment/Term-paper | 3, 6 | | | 10 | End-of-term exam | 16 | | 3 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 14 | 42 | Sınıf dışı çalışma | 4 | 14 | 56 | Arasınav için hazırlık | 3 | 8 | 24 | Arasınav | 3 | 1 | 3 | Ödev | 4.5 | 4 | 18 | Proje | 4 | 6 | 24 | Dönem sonu sınavı için hazırlık | 3 | 6 | 18 | Dönem sonu sınavı | 3 | 1 | 3 | Total work load | | | 188 |
|