Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module, students should have gained a deep understanding of the core problems behind data hiding technologies, be able to implement and evaluate various techniques published in the recent research literature and, using lecture notes and other research publications, be able to solve challenging problems in the field of data-hiding and information forensics. In the process, they will have acquired fundamental knowledge on probability and information theory, that will enable them to address many other problems outside the discipline tackled by this course.
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Autonomous Student Learning | 80 |
Total | 104 |
Basic knowledge of differential calculus
Linear Algebra
Information Theory
Digital Image Processing
Digital Communications
Statistics
Description | % of Final Grade | Timing |
---|---|---|
Continuous Assessment: COMP40600 | 100 |
Varies over the Trimester |
Compensation
This module is not passable by compensation
Resit Opportunities
No Resit
Remediation
If you fail this module you may repeat or substitute where permissible