Budapest University of Technology and Economics, Faculty of Electrical Engineering and Informatics

    címtáras azonosítással

    vissza a tantárgylistához   nyomtatható verzió    

    Security in Media Communications

    A tantárgy neve magyarul / Name of the subject in Hungarian: Médiakommunikáció-biztonság

    Last updated: 2014. március 21.

    Budapest University of Technology and Economics
    Faculty of Electrical Engineering and Informatics

    Digital Media Technology ICT Labs

    MSc specialization

    Course ID Semester Assessment Credit Tantárgyfélév
    VITMM000   2/1/0/v 4  
    3. Course coordinator and department Dr. Fehér Gábor,
    Web page of the course
    4. Instructors

    Dr. Gábor Fehér, PhDAssoc. professorTMIT
    László ZömbikResearch fellowTMIT

    5. Required knowledge Applied Cryptography and Network Security
    6. Pre-requisites
    Cryptographic algortihms, Network security protocols.
    7. Objectives, learning outcomes and obtained knowledge The general objective of the course is to give an overview of the security problems and their stat-of-the-art solutions in the field of media communications. In order to be comprehensive, the course gives a general overview on some basic cryptographic algorithms and security protocols. It then studies specific security problems related to media communications. It also shows practical examples as case studies.
    8. Synopsis
    1. Introduction to media communications security. Ciphering and data hiding in real media communication applications.

    2. Historical overview of cryptography and steganography. Algorithms and practices in the past period. Modern age cryptography. State of the art cryptography and steganography algorithms.

    3. Symmetric key ciphers. Block ciphers in theory and practice. Block cipher modes of operation. Stream ciphers in theory and practice. Converting block ciphers into stream ciphers.

    4. Hash functions and message authentication. Iterative hash functions. Unkeyed and keyed hash algorithms. Practical hash functions: MD5, SHA family

    5. Asymmetric key cryptography. The RSA algorithm. Creating RSA keys, ciphering with RSA. RSA blinding. Digital signatures. Digital signatures with RSA.

    6. Key exchange protocols. Key transportation and key agreement. Diffie-Hellman key exchange. Group keys. Key exchange for group communication.

    7. Data hiding algorithms for images and video sequences. Digital watermarking and fingerprinting. Robust watermarking for video sequences.

    8. Video ciphering algorithms. Naive and selective video encryption algorithms. Security of Digital Video Broadcasting (DVB). Video streaming security.

    9. Access control for offline media. Copy protection of offline media: DVD and Blu-Ray protections. Content Scrabbling System (CSS) and Advanced Access Content System (AACS). High-bandwidth Digital Content Protection (HDCP).

    10. Access control for online media. Digital Rights Management. Open Mobile Alliance (OMA) DRM protocols.

    11. VoIP security. Protection of VoIP systems. Firewall and NAT traversal for VoIP streams. SIP authentication. SIP identity protection.

    9. Method of instruction Three lectures hours per week.
    10. Assessment
    1. In the class period, there is an in-class test (ZH) The result of the in-class test gives 40% of the final grade. Condition for the signature is the pass mark of ZH test (40% or above). There is a possibility to rewrite the in-class test (ZH). In the rectification period (repeat period) there is another (final) possibility to rewrite the in-class test (ZH).

    2. In the examination period, there is a written examination.

    11. Recaps There is one possibility to repeat the test in the class period and there is a final one in the official recap period.
    12. Consultations Consultation with the lecturers of the subject is possible at pre-arranged time.
    13. References, textbooks and resources
    1. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, ISBN: 0-8493-8523-7

    2. Wenjun Zeng, Heather Yu, Ching-Yung Lin, Multimedia Security Technologies for Digital Rights Management, ACADEMIC PRESS, 2006.

    3. Borko Furth, Darko Kirovski, “Multimedia Security Handbook”, CRC Press, 2005

    14. Required learning hours and assignment
    Contact hours
    Preparation for lectures10
    Preparation for midterm exams18
    Home work
    Course book learning
    Preparation for final exams
    15. Syllabus prepared by

    Dr. Gábor Fehér, PhDAssoc. professorTMIT