1. | Course Title | Multimedia Security | |||||||||||
2. | Code | 4ФЕИТ05033 | |||||||||||
3. | Study program | 10-DPSM | |||||||||||
4. | Organizer of the study program (unit, institute, department) | Faculty of Electrical Engineering and Information Technologies | |||||||||||
5. | Degree (first, second, third cycle) | Second cycle | |||||||||||
6. | Academic year/semester | I/1 | 7. | Number of ECTS credits | 6.00 | ||||||||
8. | Lecturer | Dr Dimitar Tashkovski | |||||||||||
9. | Course Prerequisites | ||||||||||||
10. | Course Goals (acquired competencies):
By successfully completing the course, the student will demonstrate knowledge and understanding of the basics of digital watermarking designed to protect and verify the authenticity of multimedia works, as well as the general concept and application of steganography. The student will demonstrate knowledge and understanding of a number of watermarking methods, attacks on watermarking systems, and measures to deal with those attacks, tests used to evaluate the performance of watermarking methods and modern techniques for watermarking. analysis of works that may contain additional information. The student will be able to apply watermarking techniques for protection and authentication of multimedia works. |
||||||||||||
11. |
Course Syllabus: ntroduction to the problem of data hiding. Digital watermarking. History of watermarking. Applications and Properties. Models of Watermarking. Methods classification and evaluation. Perceptual Models in digital watermarking. Robustness and security. Digital watermarking techniques. Content Authentication. Steganography and Steganalysis. History of steganography. General concepts and applications of steganography. Multimedia data steganography techniques. Steganalysis. |
||||||||||||
12. | Learning methods:
Lectures, supported by presentations and visualization of concepts, active participation of students, homework and project assignments |
||||||||||||
13. | Total number of course hours | 180 | |||||||||||
14. | Distribution of course hours | 3 + 3 | |||||||||||
15. | Forms of teaching | 15.1 | Lectures-theoretical teaching | 45 hours | |||||||||
15.2 | Exercises (laboratory, practice classes), seminars, teamwork | 45 hours | |||||||||||
16. | Other course activities | 16.1 | Projects, seminar papers | 30 hours | |||||||||
16.2 | Individual tasks | 30 hours | |||||||||||
16.3 | Homework and self-learning | 30 hours | |||||||||||
17. | Grading | ||||||||||||
17.1 | Exams | 0 points | |||||||||||
17.2 | Seminar work/project (presentation: written and oral) | 50 points | |||||||||||
17.3. | Activity and participation | 0 points | |||||||||||
17.4. | Final exam | 50 points | |||||||||||
18. | Grading criteria (points) | up to 50 points | 5 (five) (F) | ||||||||||
from 51 to 60 points | 6 (six) (E) | ||||||||||||
from 61 to 70 points | 7 (seven) (D) | ||||||||||||
from 71 to 80 points | 8 (eight) (C) | ||||||||||||
from 81 to 90 points | 9 (nine) (B) | ||||||||||||
from 91 to 100 points | 10 (ten) (A) | ||||||||||||
19. | Conditions for acquiring teacher’s signature and for taking final exam | Regular attendance at classes | |||||||||||
20. | Forms of assessment | Project assignment and final exam. | |||||||||||
21. | Language | Macedonian and English | |||||||||||
22. | Method of monitoring of teaching quality | Internal evaluation and surveys. | |||||||||||
23. | Literature | ||||||||||||
23.1. | Required Literature | ||||||||||||
No. | Author | Title | Publisher | Year | |||||||||
1. | Cox, M. Miller, and J. Bloom | Digital Watermarking | Morgan Kaufmann Publishers, Inc., San Francisco, | 2001 | |||||||||
2. | S. Katzenbeisser and F. Petitcolas (editors), | Information Hiding Techniques for Steganography and Digital Watermarking | Artech House | 2000 | |||||||||
23.2. | Additional Literature | ||||||||||||
No. | Author | Title | Publisher | Year | |||||||||
1. | Chun-Shien Lu | Multimedia Security:: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property | Idea Group Publishing | 2004 |