5 IT 6.3-IT FOR FORENSIC SCIENCES |
Units: I |
Overview of Biometrics, Biometric Identification, Biometric Verification, Biometric
Enrollment, Biometric, System Security.
Authentication and Biometrics: Secure Authentication Protocols, Access Control
Security Services, Authentication Methods, Authentication Protocols, Matching
Biometric Samples, Verification by humans.
Common biometrics: Finger Print Recognition, Face Recognition, Speaker
Recognition, Iris Recognition, Hand Geometry, Signature Verification, Positive and
Negative of Biometrics. Matching: Two kinds of errors, Score distribution,
Estimating Errors from Data, Error Rate of Match Engines, Definition of FAR and
FRR.
|
Units: II |
Introduction to Information Hiding: Technical Steganography, Linguistic
Steganography, Copy Right Enforcement,
Wisdom from Cryptography Principles of Steganography: Framework for Secret
Communication, Security of Steganography System, Information Hiding in Noisy
Data , Adaptive versus non-Adaptive Algorithms, Active and Malicious Attackers,
Information hiding in Written Text. |
Units: III |
A Survey of Steganographic Techniques: Substitution systems and Bit Plane
Tools, Transform Domain Techniques: - Spread Spectrum and Information hiding,
Statistical Steganography, Distortion Techniques, Cover Generation Techniques.
Steganalysis: Looking for Signatures: - Extracting hidden Information, Disabling
Hidden Information.
|
Units: IV |
Watermarking and Copyright Protection: Basic Watermarking, Watermarking
Applications, Requirements and Algorithmic Design Issues, Evaluation and
Benchmarking of Watermarking system.
|
Units: V |
Transform Methods: Fourier Transformation, Fast Fourier Transformation, Discrete
Cosine Transformation, Mellin- Fourier Transformation, Wavelets, Split Images
in Perceptual Bands. Applications of Transformation in Steganography.
|
|