Information and Communication

Security


Course outline:

Brochure

Business and Trade in the Digital Age

Books, papers and reports

  1. Cryptography and Stenography
  2. Digital Signal Processing
  3. Cloud Security Alliance Guide
  4. Chirplet based Image Watermarking
  5. Covert Encryption for Electronic Data Interchange
  6. Cryptography using Evolutionary Computing
  7. Encryption using Deterministic Chaos
  8. Multi-Channel Audio Information Hiding
  9. Resilient Watermaking for Document Authentication
  10. Self-Authentication using Chirp Coding

Lectures

Assignments

Assessment Form