CS355 15 CATS (7.5 ECTS) Term 2
Option - CS, CSE, DM
CS131 Mathematics for Computer Scientists II, CS137 Discrete Mathematics II, ES193 Engineering Mathematics or equivalent.
The aim is for students to become familiar with the principles and practice of digital forensics. The module focuses on identifying source devices of digital content, content integrity verification, copyright protection, steganography, steganalysis, and content authentication. It is intended for the students to acquire the state-of-the-art multimedia-based digital forensic skills that are in acute demand in law enforcement, cyber-security and national security.
By the end of the module, students should:
- Understand the basics of image and video data acquisition and analysis, and computational methods to detect image or video forgery.
- Identify and/or design a suitable computational technique to establish or revoke authenticity of a given image/video.
Apply the identified computational techniques to detect authenticity of image and video data.
The module will deal with core concepts and enabling methodologies in multimedia-based digital forensics. It will also examine current applications, and address theoretical and practical challenges. More specifically the syllabus will cover:
• Methodologies and standards for acquisition and processing in digital forensics
• Modalities of device fingerprints
• Extraction and representation of device fingerprints
• Enhancement of device fingerprints
• Source device identification based on device fingerprints
• Content/device linking based on device fingerprints
• Content integrity verification based on device fingerprints
• Source-oriented image/video clustering based on device fingerprints
• Digital content hashing
• Data hiding
• Digital watermarking for copyright protection
• Digital watermarking for content authentication
• Counter-forensics and counter-counter-forensics
- Altheide, C., Carvey, H., Digital Forensics with Open Source Tools, 2011, Syngress.
Casey, E., Handbook of Digital Forensics and Investigation, 2009, Academic Press.
Sammons, J., The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, 2014, Syngress.
Watson, D., Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, 2013, Syngress
Two-hour examination (70%), Coursework (30%)
20 one-hour lectures plus 10 one-hour lab sessions
Jalote P, Fault Tolerance in Distributed Systems, Prentice Hall, 1994.
Lynch N, Distributed Algorithms, Morgan Kauffman, 1996.
Gouda M, Elements of Network Protocol Design, John Wiley, 1998.