Please read our student and staff community guidance on COVID-19
Skip to main content Skip to navigation

CS355 Digital Forensics

CS355 15 CATS (7.5 ECTS) Term 2

Availability

Option - CS, CSE, DM

Prerequisites

CS131 Mathematics for Computer Scientists II, CS137 Discrete Mathematics II, ES193 Engineering Mathematics or equivalent.

Academic Aims

The aim is for students to become familiar with the principles and practice of digital forensics. The module focuses on identifying source devices of digital content, content integrity verification, copyright protection, steganography, steganalysis, and content authentication. It is intended for the students to acquire the state-of-the-art multimedia-based digital forensic skills that are in acute demand in law enforcement, cyber-security and national security.

Learning Outcomes

By the end of the module, students should:

  • Understand the basics of image and video data acquisition and analysis, and computational methods to detect image or video forgery.
  • Identify and/or design a suitable computational technique to establish or revoke authenticity of a given image/video.
  • Apply the identified computational techniques to detect authenticity of image and video data.

Content

The module will deal with core concepts and enabling methodologies in multimedia-based digital forensics. It will also examine current applications, and address theoretical and practical challenges. More specifically the syllabus will cover:

• Methodologies and standards for acquisition and processing in digital forensics
• Modalities of device fingerprints
• Extraction and representation of device fingerprints
• Enhancement of device fingerprints
• Source device identification based on device fingerprints
• Content/device linking based on device fingerprints
• Content integrity verification based on device fingerprints
• Source-oriented image/video clustering based on device fingerprints
• Digital content hashing
• Data hiding
• Digital watermarking for copyright protection
• Digital watermarking for content authentication
• Steganography
• Steganalysis
• Counter-forensics and counter-counter-forensics

Books

  • Altheide, C., Carvey, H., Digital Forensics with Open Source Tools, 2011, Syngress.
  • Casey, E., Handbook of Digital Forensics and Investigation, 2009, Academic Press.

  • Sammons, J., The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, 2014, Syngress.

  • Watson, D., Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, 2013, Syngress

Assessment

Two-hour examination (70%), Coursework (30%)

Teaching

20 one-hour lectures plus 10 one-hour lab sessions

Jalote P, Fault Tolerance in Distributed Systems, Prentice Hall, 1994.
Lynch N, Distributed Algorithms, Morgan Kauffman, 1996.
Gouda M, Elements of Network Protocol Design, John Wiley, 1998.