Information and Communication
Security
Course outline:
Brochure
Business and Trade in the Digital Age
Business and Trade in the Digital Age
Books, papers and reports
Cryptography and Stenography
Digital Signal Processing
Cloud Security Alliance Guide
Chirplet based Image Watermarking
Covert Encryption for Electronic Data Interchange
Cryptography using Evolutionary Computing
Encryption using Deterministic Chaos
Multi-Channel Audio Information Hiding
Resilient Watermaking for Document Authentication
Self-Authentication using Chirp Coding
Lectures
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
Lecture 8
Lecture 9
Lecture 10
Lecture 11
Lecture 12
Assignments
Assignments
Assessment Form
Assessment Form