Skip to main content Skip to navigation

CS355 Digital Forensics

Academic Aims

The aim is for students to become familiar with the principles and practice of digital forensics. The module focuses on identifying source devices of digital content, content integrity verification, copyright protection, steganography, steganalysis, and content authentication. It is intended for the students to acquire the state-of-the-art multimedia-based digital forensic skills that are in acute demand in law enforcement, cyber-security and national security.

Learning Outcomes

By the end of the module, students should:

  • Understand the context for the application of methodologies and standards for entity acquisition and processing in digital forensics.
  • Understanding various modalities of device fingerprints and ways for extracting and enhancing device fingerprints from digital content.
  • Understanding forensic applications of device fingerprints in source device identification, content/device linking, source-oriented image clustering and content integrity verification.
  • Understanding data hiding techniques and their applications in copyright protection and content authentication.
  • Understanding data hiding techniques and their applications in steganography and steganalysis.
  • Understanding theoretical and practical challenges, including counter-forensics and counter-counter-forensics.

Content

The module will deal with core concepts and enabling methodologies in multimedia-based digital forensics. It will also examine current applications, and address theoretical and practical challenges. More specifically the syllabus will cover:

• Methodologies and standards for acquisition and processing in digital forensics
• Modalities of device fingerprints
• Extraction and representation of device fingerprints
• Enhancement of device fingerprints
• Source device identification based on device fingerprints
• Content/device linking based on device fingerprints
• Content integrity verification based on device fingerprints
• Source-oriented image/video clustering based on device fingerprints
• Digital content hashing
• Data hiding
• Digital watermarking for copyright protection
• Digital watermarking for content authentication
• Steganography
• Steganalysis
• Counter-forensics and counter-counter-forensics

15 CATS (7.5 ECTS)
Term 2

Organiser:
Tanaya Guha

Syllabus

Online material