ObjectivesThis programme provides a broad coverage of the rapidly growing technological development and emerging areas in multimedia security and applications. Many of today's security technologies involve a hybrid combination of different fields that include digital watermarking, steganography, network security, cryptography, and biometrics. For instance, many homeland security and law enforcement applications are now using multimodal biometric technologies based on a fusion of face, fingerprint and iris recognition technologies, instead of a single biometric technology, to improve identification accuracy. This degree aims to train computer and information security professionals with in-depth state-of-the-art knowledge and relevant skills in response to the rapidly changing landscape in security technologies and applications. The core competence of the programme includes an introduction to multimedia security, secure information hiding, security and cryptography, network security, digital watermarking and authentication, biometrics and computer security. This programme brings together specialised in-house expertise from the internationally renowned research Centres for Vision, Speech and Signal Processing (CVSSP) and Communication Systems Research (CCSR) for the teaching of biometrics and network security. The programme has a dissertation element, which enables the students to develop their research and analytical skills for conducting independent research in the field of multimedia security.
Entry requirementsTypical entry requirements Candidates should have a first degree in computing or cognate disciplines from a UK university or the international equivalent. They should have obtained the degree at Upper Second or higher level.
Academic titleMSc in Security Technologies and Applications
Course descriptionMSc in Security Technologies and Applications Module overview
Autumn Semester
Compulsory Modules
Introduction to Multimedia Security
This module will provide an introductory background to various digital security technologies currently used in different applications for multimedia content and documents. The knowledge gained in this module will also serve as a prerequisite for students to attend the more advanced modules in Security Technologies and Applications.
Network Security
This module aims to equip students with both theoretical and practical systematic understanding of the security challenges for the next generation of communication networks, embracing internet/mobile/satellite communications security. It will present to them real-life security problems accompanied by practical and applied solutions within the Internet, mobile and satellite environments. This approach will impart critical awareness of the key factors in Internet and wireless communications, and allow them to apply their knowledge originally in the shaping of the future of wireless.
Computer Security
Security is probably the greatest challenge for computer and information systems in the near future. Many users have lost data due to viruses, both on home and business computers. Most of us have seen a range of email messages attempting different kinds of fraud. Security holes can potentially affect all of us, from innocent home users to complex corporate systems. Internet banking and e-commerce means that money is at stake, even for common people.
This module will explain some central security models and frameworks, which will be further illustrated by case studies where we get experience with real-life security problems.
Optional Modules
Web Publishing; Internet Software Development; Information Systems Development; Challenges for Computer Professionals; Network Technologies.
Spring Semester
Compulsory Modules
Security and Cryptography
The aim of this module is to introduce the theoretical principles of private key and public key cryptography, and modelling and analysis techniques for security protocols that use cryptography.
Secure Information Hiding
Secure communications take different forms. Cryptography allows us to keep the contents of a message secret. Sometimes, however, we need to hide the very existence of the secret message. This is known as steganography. The art of unveiling the hidden information in steganographic messages is called steganalysis.
Digital Watermarking and Authentication
This module will equip students with a critical awareness of conventional and non-conventional orthogonal transform watermarking techniques for different applications, including robust watermarking for copyright protection, fragile and semi-fragile watermarking for authentication, unintentional and intentional or malicious attacks, as well as advanced recovery techniques to restore watermarks. Through laboratory sessions, students will be able to apply their theoretical understanding in developing and evaluating a digital watermarking system prototype for image authentication and restoration.