CS355-15 Digital Forensics
In this module, you will learn about the scientific techniques used to collect probative facts from digital data often in relation to cyberphysical crime.
The module will focus on a subfield of digital forensics that involves analysing image and video data for forensic purposes. This subfield (digital image forensics) is getting increasingly important since digital cameras and sophisticated photo editing softwares have become commonplace. Advanced machine learning methods are now capable of generating fake images and videos that can easily fool humans. Image forensic experts develop and use computational techniques to identify photo forgery, detect image sources and collect crime-related evidences from image data.
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
The module will deal with core concepts and enabling methodologies in multimedia-based digital
forensics. It will also examine current applications, and address theoretical and practical
challenges. More specifically the syllabus will cover:
- Methodologies and standards for acquisition and processing in digital forensics
- Modalities of device fingerprints
- Extraction and representation of device fingerprints
- Enhancement of device fingerprints
- Source device identification based on device fingerprints
- Content/device linking based on device fingerprints
- Content integrity verification based on device fingerprints
- Source-oriented image/video clustering based on device fingerprints
- Digital content hashing
- Data hiding
- Digital watermarking for copyright protection
- Digital watermarking for content authentication
- Counter-forensics and counter-counter-forensics
By the end of the module, students should be able to:
- Understand the basics of image and video data acquisition and analysis, and computational methods to detect image or video forgery.
- Identify and/or design a suitable computational technique to establish or revoke authenticity of a given image/video.
- Apply the identified computational techniques to detect authenticity of image and video data.
The 'Sensor based forensics' section in the syllabus is based on recent research advances on this topic. The students will be reading from research papers instead of textbooks. They will also implement the techniques described in the research paper.
Subject specific skills
Knowledge of types of image forgery
State-of-the-art forensics methods
Knowledge of image and video processing
Knowledge of basic probability, linear algebra and transforms
|Lectures||20 sessions of 1 hour (13%)|
|Practical classes||10 sessions of 1 hour (7%)|
|Private study||120 hours (80%)|
Private study description
Studying textbook, lecture notes, other resources provided
Solving the exercise questions and practice problems, given during the lectures
Coursework preparation including programming and report preparation.
No further costs have been identified for this module.
You do not need to pass all assessment components to pass the module.
Students can register for this module without taking any assessment.
Assessment group D1
|Group practical assignment 1||15%|
|Group practical assignment 2||15%|
|2 hour examination||70%|
~Platforms - AEP
Assessment group R
|CS355 resit examination||100%|
~Platforms - AEP
Feedback on assessment
Written feedback on coursework will be provided to the students.
Students must have studied the content of CS131 Mathematics for Computer Scientists II or CS137 Discrete Mathematics II or ES193 Engineering Mathematics or have studied equivalent material.
This module is Optional for:
- Year 3 of UCSA-G4G1 Undergraduate Discrete Mathematics
- Year 3 of UCSA-G4G3 Undergraduate Discrete Mathematics
- Year 4 of UCSA-G4G2 Undergraduate Discrete Mathematics with Intercalated Year
This module is Option list A for:
- Year 4 of UCSA-G504 MEng Computer Science (with intercalated year)
- Year 3 of UCSA-G500 Undergraduate Computer Science
- Year 4 of UCSA-G502 Undergraduate Computer Science (with Intercalated Year)
- Year 3 of UCSA-G503 Undergraduate Computer Science MEng
- Year 3 of USTA-G302 Undergraduate Data Science
- Year 3 of USTA-G304 Undergraduate Data Science (MSci)
- Year 4 of USTA-G303 Undergraduate Data Science (with Intercalated Year)
This module is Option list B for:
- Year 3 of UCSA-G406 Undergraduate Computer Systems Engineering
- Year 3 of UCSA-G408 Undergraduate Computer Systems Engineering
- Year 4 of UCSA-G407 Undergraduate Computer Systems Engineering (with Intercalated Year)
- Year 4 of UCSA-G409 Undergraduate Computer Systems Engineering (with Intercalated Year)