M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Digital Watermarking and Steganography

Digital Watermarking and Steganography Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Digital Watermarking and Steganography M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

Course Objectives:

  • To learn about the watermarking models and message coding
  • To learn about watermark security and authentication.
  • To learn about stegnography. Perceptual models

UNIT – I : INTRODUCTION: Information Hiding, Steganography and Watermarking – History of watermarking – Importance of digital watermarking – Applications – Properties – Evaluating watermarking systems. WATERMARKING MODELS & MESSAGE CODING: Notation – Communications – Communication based models – Geometric models – Mapping messages into message vectors – Error correction coding – Detecting multi-symbol watermarks.

UNIT- II : WATERMARKING WITH SIDE INFORMATION & ANALYZING ERRORS: Informed Embedding – Informed Coding – Structured dirty-paper codes – Message errors – False positive errors – False negative errors – ROC curves – Effect of whitening on error rates.

UNIT – III : PERCEPTUAL MODELS: Evaluating perceptual impact – General form of a perceptual model – Examples of perceptual models – Robust watermarking approaches – Redundant Embedding, Spread Spectrum Coding, Embedding in Perceptually significant coefficients

UNIT – IV : WATERMARK SECURITY & AUTHENTICATION: Security requirements – Watermark security and cryptography – Attacks – Exact authentication – Selective authentication – Localization – Restoration.

UNIT – V : STEGANOGRAPHY: Steganography communication – Notation and terminology – Informationtheoretic foundations of steganography – Practical steganographic methods – Minimizing the embedding impact – Steganalysis

REFERENCES:

  • Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital Watermarking and Steganography”, Margan Kaufmann Publishers, New York, 2008.
  • Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, “Digital Watermarking”, Margan Kaufmann Publishers, New York, 2003.
  • Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications of Digital Watermarking and Contest Protection”, Artech House, London, 2003.
  • Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York, 2005.
  • Peter Wayner, “Disappearing Cryptography – Information Hiding: Steganography & Watermarking”, Morgan Kaufmann Publishers, New York, 2002.

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.