S004117-4112-信息隐藏与通信保密

发布者:沈如达发布时间:2018-04-23浏览次数:21

研究生课程开设申请表

 开


 课院(系、所): 信息科学与工程学院


 课程申请开设类型: 新开□     重开    更名□请在内打勾,下同

课程

名称

中文

信息隐藏与通信保密

英文

Information Hiding and Communication Privacy

待分配课程编号

S004112

课程适用学位级别

博士


硕士

总学时

32

课内学时

30

学分

2

实践环节

 验


用机小时

2

课程类别

公共基础     专业基础     专业必修       专业选修

开课院()

信息科学与工程学院

开课学期

秋季

考核方式

A.笔试(开卷   闭卷)      B. 口试    

C.笔试与口试结合                 D. √其他       考查          

课程负责人

教师

姓名

陈立全

职称

副研究员

e-mail

Lqchen@seu.edu.cn

网页地址


授课语言

中文

课件地址


适用学科范围

信号与信息处理、信息安全

所属一级学科名称

信息与通信工程

实验(案例)个数

1

先修课程

信号与系统

教学用书

教材名称

教材编者

出版社

出版年月

版次

主要教材

信息隐藏与数字水印

钮心忻

北京邮电大学出版社

20045

1

主要参考书

信息隐藏——理论与技术

王育民等

清华大学出版社

20063

1

网络信息安全理论与技术

蒋睿、胡爱群等

华中科技大学出版社

20078

1

信息隐藏技术与应用

王丽娜,张焕国

武汉大学出版社

20038

1


一、课程介绍(含教学目标、教学要求等)300字以内)


信息隐藏是一门既古老又年轻的学科,它是信号处理和信息安全的交叉学科,在网络信息安全和军事保密上具有重要的作用。本课程全面介绍了信息隐藏相关的理论、技术和应用,包括密码学基础;信息隐藏的基本原理、算法和分析方法;数字水印的原理、算法及攻击方法;阈下信道及隐信道、隐匿签名及隐匿通信等内容。


通过本课程的学习,使学生掌握信息隐藏相关的基本概念和原理,深度了解已有的信息隐藏关键算法和技术。要求学生学完本课以后,能够了解该领域的研究基本情况,掌握一些基本算法和技术,为从事信息隐藏及通信保密科学研究和工程实践做好准备。



二、教学大纲(含章节目录):(可附页)


  1. 概论
    1.1
    通信保密技术回顾和发展
    1.2
    信息隐藏的历史回顾
    1.3
    信息隐藏与通信保密

  2. 基础知识
    2.1
    密码学基本概念

2.2 密码体制和认证系统
2.
3
安全协议
2.
4
语音图像信号处理基础
2.
5
人类听觉视觉特点分析

  1. 信息隐藏基本原理与技术
    3.1
    信息隐藏的概念与分类
    3.2
    信息隐藏的安全性与健壮性
    3.3
    信息隐藏的基本模型
    3.4
    信息隐藏的应用
    3.5
    时域替换信息隐藏技术
    3.6
    变换域信息隐藏技术

3.7 其他隐藏技术

3.8 几种具体算法介绍

  1. 信息隐藏分析
    4.1
    信息隐藏分析的方法
    4.2
    信息隐藏分析的分类
    4.3
    信息隐藏分析示例

  2. 数字水印基本原理与技术
    5.1
    数字水印的定义与分类
    5.2
    数字水印性能评价与应用
    5.3
    数字水印的形式和产生
    5.4
    数字水印框架
    5.5
    图像数字水印技术

5.6 视频数字水印技术

5.7 音频数字水印技术

5.8 软件数字水印技术

5.9 数字指纹技术

5.10数字水印协与安全体系

  1. 数字水印攻击方法
    6.1
    数字水印攻击的分类
    6.2
    水印攻击软件

  2. 隐匿签名及隐匿通信
    7.1
    隐匿签名基本原理

7.2 隐匿通信基本原理

7.3 隐匿签名和隐匿通信的关键算法和协议

7.4 隐匿签名和隐匿通信的应用





三、教学周历

 周次

 教学内容

 教学方式

1

 概论与基础知识

 讲课

2

信息隐藏原理(1)

 讲课

3

 信息隐藏原理(2)

 讲课

4

 信息隐藏技术(1)

 讲课

5

 信息隐藏技术(2)

 讲课

6

 信息隐藏分析(1)

 讲课

7

 信息隐藏分析(2)

 讲课

8

 数字水印基本原理

 讲课

9

 数字水印技术(1)

 讲课

10

 数字水印技术(2)

 讲课

11

 数字水印协议

 讲课

12

 数字水印攻击

 讲课

13

 隐匿签名基本原理(1)

 讲课

14

 隐匿签名基本原理(2)

 讲课

15

 课程讨论

 讨论

16

 仿真指导

 讨论

17



18




四、主讲教师简介:


陈立全,男,19764月生,广西玉林人。1998年于南京大学电子科学与工程系获学士学位,2005年毕业于东南大学信号与信息处理专业,获工学博士学位。20077月于东南大学信息科学与工程学院博士后流动站出站,留校任教。作为主要负责人完成了多项国家“863”计划、省部级基金等科研项目。在国内外重要期刊及IEEE国际学术会议上发表学术论文17篇。目前主要研究方向为移动通信保密及无线网络安全、信息隐藏等。




五、任课教师信息(包括主讲教师):

 任课

 教师

 学科

 (专业)

 办公

 电话

 住宅

 电话

 手机

 电子邮件

 通讯地址

 邮政

 编码

陈立全

信息安全

025-83795822-810

025-83370530

13813852253

lqchen@seu.edu.cn

李文正楼北437

210096




Application Form For Opening Graduate Courses

S


 chool (Department/Institute)School of Information Science and Engineering


Course Type: New Open □   Reopen    Rename □Please tick in □, the same below

Course Name

Chinese

信息隐藏与通信保密

English

Information Hiding and Communication Privacy

Course Number

S004112

Type of Degree

Ph. D


Master

Total Credit Hours

32

In Class Credit Hours

30

Credit

2

Practice

practice

Computer-using Hours

2

Course Type

Public Fundamental    □Major Fundamental    □Major Compulsory Major Elective

School (Department)

School of Information science and engineering

Term

Fall

Examination

A. □PaperOpen-book   □ Closed-bookB. □Oral   

C. □Paper-oral Combination                       D.Otherspaper

Chief

Lecturer

Name

Chen Li Quan

Professional Title

Associate professor

E-mail

lqchen@seu.edu.cn

Website


Teaching Language used in Course

Chinese

Teaching Material Website


Applicable Range of Discipline

Information and Signal Processing, Information Security

Name of First-Class Discipline

Information  and  Communication Engineering

Number of Experiment

1

Preliminary Courses

Signal and System

Teaching Books

Textbook Title

Author

Publisher

Year of Publication

Edition Number

Main Textbook

Information Hiding and Digital Watermarking

Niu XinXin

BUPT Press

2004.5

1

Main Reference Books

Information Hiding: Theory and Technology

Wang Yu Min etc.

Tsinghua University Press

2006.3

1

Theory and Technology for Network Information Security

Jiang rui, Hu Aiqun etc.

HUST Press

2007.8

1

Information Hiding Technology and Application

Wang Li Nan, Zhang Huan Guo

Wuhan University Press

2003.8

1


  1. Course Introduction (including teaching goals and requirements) within 300 words:


Information hiding is an old and novel subject. As the joint subject of signal processing and information security, the theory and technology of Information hiding and Digital watermarking can make a good help to network security and military privacy. This course fully introduce the theories, technologies and applications of Information hiding, which include cryptologybasic; theories, basic algorithms and attacks of Information hiding; theories, basic algorithms and attacks of Digital watermarking; Subliminal channel and Convert channel technologies; Hiding signature and Hiding communication.

After study of this course, the basic concepts and principles of Information hiding are accepted by students, the key algorithms and technologies can be deeply understand by the students. The students should know the base of this field, hold the basic Information hiding and Digital watermarking schemes and technologies to finish information security design, and make good ready for the science research, engineering practice of Information Hiding and privacy communication.




  1. Teaching Syllabus (including the content of chapters and sections. A sheet can be attached):



Ch1 Introduction
    1. 1.1 Communication privacy survey

    2. 1.2 History of information hiding

    3. 1.3 Information hiding and communication privacy

Ch2 Basic knowledges

    1. Basic concepts of cryptology

    2. Cryptology and authentication

    3. Information security protocol

    4. Speech and image signal processing

    5. Character of human listening and visual

Ch3 Basic theories and technologies of information hiding

    1. Concept and classify

    2. Security and robust analysis

    3. Basic model

    4. Application

    5. Time dimension technologies

    6. Frequency dimension technologies

    7. The other technologies

    8. Algorithms presentation

Ch4 Analysis ofinformation hiding
    1. Analysis schemes

    2. Classify of analysis schemes

    3. Analysis examples

Ch5 Basic theories and technologies of digital watermarking

5.1 Concept and classify of digital watermarking

5.2 Performance evaluation and application

5.3 Character and development

5.4 Architecture

5.5Image digital watermarking

5.6 Video digital watermarking

5.7Speech digital watermarking

5.8 Software digital watermarking

5.9 Digital fingerprinttechnologies

5.10 Digital watermarking protocols and system

Ch6 Attacks to digital watermarking

6.1 Classify

6.2 Software introduction

Ch7 Subliminal channel transmission technology

7.1 Basic theory of subliminal channel

7.2 Key algorithms of subliminal channel

7.3 Security architecture of subliminal channel

7.4 Application of subliminal channel technology




  1. Teaching Schedule:


Week

Course Content

Teaching Method

1

Introduction and basic knowledges

Presentation

2

Theory of information hiding (1)

Presentation

3

Theory of information hiding (2)

Presentation

4

Technologies of information hiding (1)

Presentation

5

Technologies of information hiding (2)

Presentation

6

Analysis of information hiding (1)

Presentation

7

Analysis of information hiding (2)

Presentation

8

Basic theory of digital watermarking

Presentation

9

Technologies of digital watermarking (1)

Presentation

10

Technologies of digital watermarking (2)

Presentation

11

Protocol of digital watermarking

Presentation

12

Attack analysis of digital watermarking

Presentation

13

Subliminal channel transmission technology(1)

Presentation

14

Subliminal channel transmission technology(1)

Presentation

15

Discussion

Presentation

16

Simulation

Presentation

17



18



Note: 1.Above one, two, and three items are used as teaching Syllabus in Chinese and announced on the Chinese website of Graduate School. The four and five items are preserved in Graduate School.


2. Course terms: Spring, Autumn , and Spring-Autumn term.  

3. The teaching languages for courses: Chinese, English or Chinese-English.

4. Applicable range of discipline: public, first-class discipline, second-class discipline, and third-class discipline.

5. Practice includes: experiment, investigation, research report, etc.

6. Teaching methods: lecture, seminar, practice, etc.

7. Examination for degree courses must be in paper.

8. Teaching material websites are those which have already been announced.

9. Brief introduction of chief lecturer should include: personal information (date of birth, gender, degree achieved, professional title), research direction, teaching and research achievements. (within 100-500 words)


  1. Brief Introduction of Chief lecturer:


Chen Li Quan was born in April, 1976 in Yulin, Guangxi province, China. He received his B.E. degree in Electronic Engineering from Nanjing University in 1998, M.S. degree in Signal processing from C.A.S. in 2001. In June 2005, He got his Ph.D. degree in Information and Signal Processing from Southeast University. Dr. Chen finished his two-year post-doctorial research in School of Information Science and Engineering of Southeast University in 2007, and became a teacher of this university in the same year. As the major contributor, Dr. Chen has finished several science research projects. He has published up to 17 high level science papers in the important journals and conferences all over the world. Now, His major researches are focused on mobile communication privacy, wireless network security and information hiding technologies.



  1. Lecturer Information (include chief lecturer)


Lecturer

Discipline

(major)

Office

Phone Number

Home Phone Number

Mobile Phone Number

Email

Address

Postcode

Chen Liquan

Information Security

025-83795822-810

025-83370530

13813852253

Lqchen@seu.edu.cn

North #435, Li Wen Zheng Building

210096



10