MSc in Security Technologies and Applications

+ Information by E-mail

MSc in Security Technologies and Applications

  • Objectives This programme provides a broad coverage of the rapidly growing technological development and emerging areas in multimedia security and applications. Many of today's security technologies involve a hybrid combination of different fields that include digital watermarking, steganography, network security, cryptography, and biometrics. For instance, many homeland security and law enforcement applications are now using multimodal biometric technologies based on a fusion of face, fingerprint and iris recognition technologies, instead of a single biometric technology, to improve identification accuracy. This degree aims to train computer and information security professionals with in-depth state-of-the-art knowledge and relevant skills in response to the rapidly changing landscape in security technologies and applications. The core competence of the programme includes an introduction to multimedia security, secure information hiding, security and cryptography, network security, digital watermarking and authentication, biometrics and computer security. This programme brings together specialised in-house expertise from the internationally renowned research Centres for Vision, Speech and Signal Processing (CVSSP) and Communication Systems Research (CCSR) for the teaching of biometrics and network security. The programme has a dissertation element, which enables the students to develop their research and analytical skills for conducting independent research in the field of multimedia security.
  • Entry requirements Typical entry requirements Candidates should have a first degree in computing or cognate disciplines from a UK university or the international equivalent. They should have obtained the degree at Upper Second or higher level.
  • Academic title MSc in Security Technologies and Applications
  • Course description MSc in Security Technologies and Applications Module overview

    Autumn Semester

    Compulsory Modules

    Introduction to Multimedia Security
    This module will provide an introductory background to various digital security technologies currently used in different applications for multimedia content and documents. The knowledge gained in this module will also serve as a prerequisite for students to attend the more advanced modules in Security Technologies and Applications.

    Network Security
    This module aims to equip students with both theoretical and practical systematic understanding of the security challenges for the next generation of communication networks, embracing internet/mobile/satellite communications security. It will present to them real-life security problems accompanied by practical and applied solutions within the Internet, mobile and satellite environments. This approach will impart critical awareness of the key factors in Internet and wireless communications, and allow them to apply their knowledge originally in the shaping of the future of wireless.

    Computer Security
    Security is probably the greatest challenge for computer and information systems in the near future. Many users have lost data due to viruses, both on home and business computers. Most of us have seen a range of email messages attempting different kinds of fraud. Security holes can potentially affect all of us, from innocent home users to complex corporate systems. Internet banking and e-commerce means that money is at stake, even for common people.

    This module will explain some central security models and frameworks, which will be further illustrated by case studies where we get experience with real-life security problems.

    Optional Modules

    Web Publishing; Internet Software Development; Information Systems Development; Challenges for Computer Professionals; Network Technologies.

    Spring Semester

    Compulsory Modules

    Security and Cryptography
    The aim of this module is to introduce the theoretical principles of private key and public key cryptography, and modelling and analysis techniques for security protocols that use cryptography.

    Secure Information Hiding
    Secure communications take different forms. Cryptography allows us to keep the contents of a message secret. Sometimes, however, we need to hide the very existence of the secret message. This is known as steganography. The art of unveiling the hidden information in steganographic messages is called steganalysis.

    Digital Watermarking and Authentication

    This module will equip students with a critical awareness of conventional and non-conventional orthogonal transform watermarking techniques for different applications, including robust watermarking for copyright protection, fragile and semi-fragile watermarking for authentication, unintentional and intentional or malicious attacks, as well as advanced recovery techniques to restore watermarks. Through laboratory sessions, students will be able to apply their theoretical understanding in developing and evaluating a digital watermarking system prototype for image authentication and restoration.
     
    Programme length
    12 months full-time
+ Information by E-mail

Other programs related to information quality and security

  • Master Information Processing & Neural Networks

  • Institution: King's College London
  • + Information by E-mail
  • Master Web Intelligence

  • Institution: King's College London
  • + Information by E-mail
  • Master Computing & Internet Systems

  • Institution: King's College London
  • + Information by E-mail
  • MSc (PgDip, PgCert) in Computer GamesTechnology

  • Institution: Liverpool John Moores University, Faculty of Technology and Environment
  • + Information by E-mail
  • Advanced Software Engineering MSc

  • Institution: University of Westminster
  • + Information by E-mail
  • Cisco Certificate of Competence Network Security

  • Institution: London Metropolitan University
  • + Information by E-mail
  • Master Broadband and High-Speed Communications Networks

  • Institution: University of Westminster
  • + Information by E-mail