10 Days Course
Media Security and Forensics
Under the aegis of MHRD - Global Initiative of Academic Networks (GIAN)
March 26 - April 06, 2018
How to reach IIT Indore

The ease in acquiring, distributing, using, and manipulating digital media such as images, text, audio and video has opened a large avenue of applications however, at the same time it has posed a number of important security concerns and challenges to the forefront. These concerns and challenges have resulted into significant amount of research activities being undertaken in the areas such as media security, digital forensics, steganography, data hiding, digital watermarking, media identification, and encryption to provide security, authenticity, and ownership of media objects. The outcomes of the research activities in these research areas have also given rise to new models and applications to convert media security tools and objects to revenue without violating the ownership rights.

The area of digital media security and forensics mainly deals with finding deleted or hidden data in digital media. It is the science of investigation into the systemic processes and primarily utilizes computing and communication technologies to acquire, treat, store, transmit and analyze data. It also deals with understanding the underlying technologies behind various computing tools used in the generation and the consumption of digital data and the development of ability to obtain reliable and scientifically valid information from digital media. It deals with developing techniques and tools to identify the person(s) responsible for the compromise or theft of sensitive digital data, if it occurs.
The history of digital media forensics primarily started with governmental agencies and with a few dedicated civilian professionals. It is now widely practiced in government agencies and in commercial sector. Many government agencies are at the forefront in using the technologies of digital media forensics in searching, seizing, and analyzing information systems containing digital media and in acquiring reliable digital evidence from these systems.

This course on media security and forensics will provide an excellent opportunity to students, researchers and practitioners to know about the latest developments in the area of media security and forensics.

Objectives of the course

Main objectives of the proposed course are listed below :

  • It will introduce participants to the exciting area of media security and forensics
  • It will provide participants an opportunity to learn basic as well as advance topics of media security and forensics.
  • The course will deal with both theoretical and practical aspects of the media security and forensics.
  • It will cover various techniques/algorithms used in media security and forensics.
Topics Covered
  • Introduction to Media Security and Forensics: Cyrptography Basics, Public Private Key Crypto, AES and RSA Encryption and Decryption, Hash functions and Signatures
  • Media Authentication: Image, Video, and Hardcopy, MD5/Secure Hash Algorithm, Watermarking, Data Hiding, Steganograpy.
  • Image Watermarking: Spread Spectrum Watermark Embedding, Hardcopy Image Data Hiding, Quantization Index Modulation, Watermark Embedding.
  • Audio and Video Watermarking: Spread Spectrum and Echo Audio Data Embedding, Speech Watermarking, Perceptual Shaping for Audio Data Embedding, Video Watermarking.
  • Steganography: Image Steganography and Steganalysis, Image Steganography Evaluation, Media Encryption for Distribution and Privacy, Access Control for Video Distribution, Compressive Sensing Based Image Encryption.
  • Media Forensics: Image Sensor Forensics, PRNU Camera Identification, Counter-forensics and Privacy, Summary and Emerging Directions, PRNU Counter forensics
Schedule of the Course

Date : March 26 - April 06, 2018
Total Number of days/lectures : 10 days /30 lectures & tutorials

Who Can Attend The Course?
  • Research scholars, graduate students, researchers from different organization across the country working in the area of multimedia security and forensics.
  • Young researchers working in R & D laboratories related to multimedia security and forensics.
  • Faculty members and academicians interested in the field of multimedia security and forensics.
  • Student of all levels (BTech/MSc/MTech/PhD) from academic institutions and technical institutions.
Registration Fee


Early Registration
(on or before January 26, 2018)
Late Registration
(on or before February 26, 2018)
February 26, 2018 or onsite
Participant from outside India
USD 500
USD 600
USD 650
Participant from Industry/ Business organization
Rs. 20,000
Rs. 24,000
Rs. 26,000
Participant from Academic Institution
Rs. 5,000
Rs. 6,000
Rs. 6,500

The fee includes all instructional materials, computer use for tutorials, and lunch. The participants will be provided with single bedded accommodation on payment basis.

How to Apply?

To apply for the course, please follow the steps given below :

Step 1: Payment of Registration Fee:
Payment for the registration fee can be made through online/offline mode. Online payment can be made through NEFT transfer and offline payment can be made through Demand Draft. Details regarding payment are as follows:

I. By Demand Draft : Demand Draft should be drawn in favor of “Registrar, IIT Indore”, payable at Indore.

II. By NEFT Transfer : Registration fee can be paid through NEFT. Transfer of the amount can be done to the account number given below:

Name of the Beneficiary : Registrar, Indian Institute of Technology Indore
Name of Bank : Canara Bank
Branch Code : IIT Indore, Simrol Campus Branch
Beneficiary Account No. : 1476101027440
Bank MICR Code : 452015003
Bank IFS Code : CNRB0006223

Step 2: Registration : After completing the payment of registration fee, fill the application form available http://gian.iiti.ac.in/register.php to complete the registration.

If payment is made through Demand Draft, send your Demand Draft to the following address (also e-mail the scanned copy of the Demand Draft to surya@iiti.ac.in):

Dr. Surya Prakash
Assistant Professor
Research Group on Biometrics, Pattern Recog. & Computer Vision
Discipline of Computer Science and Engineering
Indian Institute of Technology Indore
Simrol Campus, Khandwa Road,
Indore – 453552, India.

Registration can also be done offline by filling the form printed in the brochure (available here) and sending it along with Demand Draft (print of the online payment receipt if payment is made online) to above mentioned address

Faculty Information

Prof. Gaurav Sharma is with the University of Rochester, where he is a Professor in the Department of Electrical and Computer Engineering, Department of Computer Science, Department of Biostatistics and Computational Biology, and Department of Oncology. From 2008-2010, he served as the Director for the Center for Emerging and Innovative Sciences (CEIS), a New York state supported center for promoting joint university-industry research and technology development, which is housed at the University of Rochester. From 1996 through 2003, he was with Xerox Research and Technology in Webster, NY first as a member of research and technology staff and then as a Principal Scientist and Project Leader. He received the Ph.D. in Electrical and Computer Engineering from North Carolina State University, Raleigh, NC, and masters degrees in Applied Mathematics from NCSU and in Electrical Communication Engineering from the Indian Institute of Science, Bangalore, India. He received his bachelor of engineering degree in Electronics and Communication Engineering from Indian Institute of Technology, Roorkee (formerly, Univ. of Roorkee). Professor Sharma is a fellow of the IEEE, a fellow of SPIE, and a fellow of the Society for Imaging Science and Technology (IS&T). For more information Technology (IS&T). For more information visit: http://www.ece.rochester.edu/~gsharma/

Dr. Surya Prakash is currently an Assistant Professor in Discipline of Computer Science and Engineering at Indian Institute of Technology Indore, India. He is also the Head of discipline of computer science and engineering. He received his MS and PhD degrees in computer science and engineering from Indian Institute of Technology Madras, India and Indian Institute of Technology Kanpur,India respectively. His research interest includes Image processing, computer vision, pattern recognition, biometrics, and identity and infrastructure management. He has published several research articles in peer-reviewed international journals and conferences. He has also co-authored two books titled "IT Infrastructure and Its Management" published by Tata McGraw-Hill, India and "Ear Biometrics in 2D and 3D: Localization and Recognition" published by Springer. He has also been in the program committees of several international conferences in the field of pattern recognition, image processing and intelligent computing. For more information please visit: http://iiti.ac.in/people/~surya/