《信息内容安全》教学大纲
课程代码 | 045101951 | ||
课程名称 | 信息内容安全 | ||
英文名称 | Information Content Security | ||
课程类别 | 专业领域课 | ||
课程性质 | 选修(专业必修) | ||
学时 | 总学时:48 实验学时:16 实习学时:0 其他学时:0 | ||
16学分 | 2.5 | ||
开课学期 | 第6学期 | ||
开课单位 | 计算机科学与工程学院 | ||
适用专业 | 信息安全及计算机相关专业 | ||
授课语言 | 中文 | ||
先修课程 | 《密码学与安全协议》、《高级语言程序设计C++》、《数字图像处理》 | ||
课程对毕业要求的支撑 | (本学院开设的专业课填写;根据专业所列的毕业要求来填写) №3.设计/开发解决方案:能够设计针对信息安全复杂工程问题的解决方案,设计满足特定需求的信息安全解决方案,并能够在设计环节中体现创新意识,考虑社会、健康、安全、法律、文化以及环境等因素。 №5.使用现代工具:能够针对信息安全复杂工程问题,开发、选择与使用恰当的技术、资源、现代工具和信息技术工具,包括对信息安全复杂工程问题的预测与模拟,并能够理解其局限性。 №6.工程与社会:能够基于信息安全工程相关背景知识进行合理分析,评价信息安全专业工程实践和复杂工程问题解决方案对社会、健康、安全、法律以及文化的影响,并理解应承担的责任。 №8.职业规范:具有人文社会科学素养、社会责任感,能够在工程实践中理解并遵守工程职业道德和规范,履行责任。 | ||
课程目标 | 完成课程后,学生将具备以下能力: (1)掌握设计/开发与信息内容安全相关的解决方案; (2)能够使用与数字内容安全相关的技术工具; (3)能够基于所学知识合理分析数字内容的安全工程问题,评价内容安全解决方案对社会、健康、安全、法律以及文化的影响,并理解应承担的责任; (4)具备科学素养和社会责任感,能够在工程实践中理解并遵守职业道德和规范。 | ||
课程简介 | 信息内容安全是数字内容在技术、政治、法律、道德等层次上的安全要求,即信息内容在技术上是可靠的,在政治上是健康的,在法律上是符合国家法律法规的,在道德上是符合优良传统的。通过本课程的学习,使学生掌握信息内容安全中的基本概念、基本理论和基本技术。主要教学内容包括:信息内容安全的概念,信息加密技术,消息认证与数字签名,信息隐藏与数字水印,数字取证技术,文本内容安全,数字图像内容安全,数字音频内容安全,数字视频内容安全,数据库安全等。 | ||
教学内容与学时分配 | 内容 | 学时 | 要求 |
思想政治教育 | 1 |
| |
数字内容的基本概念 | 2 |
| |
信息加密技术 | 3 | (1) 了解密码学基础; (2) 掌握古典密码技术; (4) 掌握公钥加密技术; (5) 了解新型密码技术。 | |
消息认证与数字签名 | 3 | (1) 了解常用的单向Hash函数; (2) 掌握消息认证码; (4) 掌握消息认证模式。 | |
信息隐藏与数字水印 | 4 | (1) 熟悉信息隐藏与数字水印的基本概念; (2) 掌握信息隐藏技术; (4) 了解信息隐藏与数字水印的应用与发展。 | |
数字取证技术 | 4 | (1) 掌握数字取证的基本概念; (2) 了解数字取证技术的分类; (3) 掌握数字内容篡改取证; (4) 了解数字内容来源取证; (5) 掌握数字内容隐密分析取证。 | |
文本内容安全 | 2 | (1) 了解文本内容安全的基本概念; (2) 了解文本内容加密技术; (3) 掌握文本隐写与文本水印技术; (4) 了解文本过滤与分类技术; (5) 了解文本隐写分析技术。 | |
数字图像内容安全 | 4 | (1) 了解数字图像内容安全的基本概念; (2) 掌握数字图像内容加密技术; (3) 掌握数字图像内容隐写与水印技术; (4) 了解数字图像内容隐写分析技术。 | |
数字音频内容安全 | 3 | (1) 了解数字音频内容安全的基本概念; (2) 了解数字音频内容加密技术; (3) 掌握数字音频隐写与水印技术; (4) 了解数字音频隐写分析和取证技术。 | |
数字视频内容安全 | 3 | (1) 了解数字视频内容安全的基本概念; (2) 了解数字视频内容加密技术; (3) 掌握数字视频隐写与水印技术; (4) 了解数字视频隐写分析和取证技术。 | |
数据库安全 | 3 | (1) 了解数据库安全的基本概念; (2) 了解数据库面临的安全威胁; (3) 了解数据库安全访问策略; (4) 了解数据库水印技术; (5) 了解数据库安全管理。 | |
合计 | 32 | ||
实验教学(包括上机学时、实验学时、实践学时) | 内容 | 学时 | 要求 |
信息加密与内容验证 | 4 | (1) 掌握常用的信息加密算法; (2) 掌握数字内容篡改检测。 | |
数字图像信息隐藏 | 4 | (1) 掌握数字图像信息隐藏的简单算法; (2) 实现数据提取。 | |
JPEG图像隐写与隐写分析 | 4 | (1) 能够运用JPEG图像的几种隐写算法; (2) 采用隐写分析算法检测JPEG图像中的秘密消息。 | |
数字视频内容取证 | 4 | (1) 了解视频编解码过程; (2) 掌握从视频数据中提取特征进行取证分析。 | |
合计 | 16 | ||
教学方法 | 课堂讲授 | ||
考核方式 | 本课程采用 笔试 (形式)按上述要求考试,占该课程总评成绩的60 %。 本课程还结合的考核形式有:实验、作业、出勤占该课程总评成绩的40 %。 | ||
教材及参考书 | 教 材:
参考书:
3、马民虎,互联网信息内容安全管理教程. 中国人民公安大学出版社,2007 | ||
制定人及制定时间 | 吴昊天 2019/04/14 |
“Information Content Security” Syllabus
Course Code | 045101951 | ||
Course Title | Information Content Security | ||
Course Category | Specialty-related Course | ||
Course Nature | Elective Course | ||
Class Hours | Total Hours: 48 Experimental Hours: 16 Internship hours: 0 Other hours: 0 | ||
Credits | 2.5 | ||
Semester | the 6th semester | ||
Institute | Computer Science and Engineering | ||
Program Oriented | Information security and the related computer major | ||
Teaching Language | Chinese | ||
Prerequisites | Cryptography and Security Protocol, Advanced Programming Language C++, Digital Image Processing | ||
Student Outcomes (Special Training Ability) | 3. Designing and Developing Solutions: with the ability to design the solutions to complex and specific engineering problems in information security, to have an innovative sense in the design phase by considering the factors of society, health, safety, law and culture. 5. Applying the Modern Tools: with the ability to develop, select and use the appropriate techniques, resources, and modern tools and IT tools, including prediction and simulation, to solve the complex engineering activities in information security and understand the limitations. 6. Engineering and Society: with the ability to reasonably analyze and evaluate the impacts of professional engineering practice and solutions to the complex engineering problems to society, health, safety, law and culture issues by using the background knowledge of information security engineering, to understand the consequent responsibility. 8. Professional Regulations: to understand the humanity science and have the sense of social responsibility, be able to responsibly understand and abide the professional ethics and regulations in engineering practice. | ||
Course Objectives | Students will achieve the following abilities after completing the course study: 1. Capable of designing and developing the solutions related to information content security; 2. Capable of using the technical tools related to information content security; 3. With the ability to reasonably analyze the digital content security engineering problems, to evaluate the impacts of professional practices and solutions to society, health, safety, law and culture, and to understand the consequent responsibility. 4. To have scientific quality and sense of social responsibility and be able to responsibly understand and abide the professional ethics and regulations in engineering practice. | ||
Course Description | The course of Information Content Security focuses on the security requirements of information content in the aspects of technique, politic, law and moral. That is, the information content is reliable in the implementation techniques, correct in politics, conforming to the state laws and regulations, and according with the good traditions in moral. Through studying this course, students will understand the basic concepts, theories and techniques in information content security. The course content includes the following chapters: basic concept of information content security, information encryption techniques, message authentication and digital signature, information hiding and digital watermarking, digital forensics, text content security, digital image content security, digital audio/video content security, and database security. | ||
Teaching Content and Class Hours Distribution | Content | Hours | Requirement |
Thoughts and politics | 1 |
| |
Basic concept of information content security | 2 |
| |
Information encryption techniques | 3 |
| |
Message authentication and digital signature | 3 |
| |
Information hiding and digital watermarking | 4 |
| |
Digital forensics | 4 |
| |
Text content security | 2 |
techniques;
| |
Digital image content security | 4 |
(4) To master image steganalysis techniques. | |
Digital audio content security | 3 |
(4) To know audio steganalysis and forensics. | |
Digital video content security | 3 |
(4) To know video steganalysis and forensics. | |
Database security | 3 |
| |
Total | 32 | ||
Experimental Teaching | Content | Hours | Requirements |
Information encryption and content verification | 4 |
| |
Digital image information hiding | 4 |
image information hiding; (2) To implement the data extraction. | |
JPEG image steganography and steganalysis | 4 |
algorithms to JPEG images;
| |
Digital video forensics | 4 |
from video content for tampering detection. | |
Total | 16 | ||
Teaching Method | Class instruction | ||
Examination Method | 60% of total score is based on final written examination, while 40 % of total score is based on experiments, assigned homework and attendance. | ||
Teaching Materials and Reference Books | Textbook: 1.彭飞,龙敏,刘玉玲,数字内容安全原理与应用. 清华大学出版社. 2012 Reference Book: 1.周学广,任延珍,孙艳,张立强,信息内容安全. 武汉大学出版社. 2012 2.李建华,信息内容安全管理及应用. 机械工业出版社. 2010 3.马民虎,互联网信息内容安全管理教程. 中国人民公安大学出版社,2007 | ||
Prepared by Whom and When | By WU Haotian on 2019/04/14 |
《信息内容安全》实验教学大纲
课程代码 | 045101951 |
课程名称 | 信息内容安全 |
英文名称 | Information Content Security |
课程类别 | 专业领域课 |
课程性质 | 选修(专业必修) |
学时 | 总学时:48 实验学时:16 实习学时:0 其他学时:0 |
学分 | 2.5 |
开课学期 | 第6学期 |
开课单位 | 计算机科学与工程学院 |
适用专业 | 信息安全及计算机相关专业 |
授课语言 | 中文 |
先修课程 | 《密码学与安全协议》、《高级语言程序设计C++》、《数字图像处理》 |
毕业要求(专业培养能力) | (本学院开设的专业课填写;根据专业所列的毕业要求来填写) №3.设计/开发解决方案:能够设计针对信息安全复杂工程问题的解决方案,设计满足特定需求的信息安全解决方案,并能够在设计环节中体现创新意识,考虑社会、健康、安全、法律、文化以及环境等因素。 №5.使用现代工具:能够针对信息安全复杂工程问题,开发、选择与使用恰当的技术、资源、现代工具和信息技术工具,包括对信息安全复杂工程问题的预测与模拟,并能够理解其局限性。 №6.工程与社会:能够基于信息安全工程相关背景知识进行合理分析,评价信息安全专业工程实践和复杂工程问题解决方案对社会、健康、安全、法律以及文化的影响,并理解应承担的责任。 №8.职业规范:具有人文社会科学素养、社会责任感,能够在工程实践中理解并遵守工程职业道德和规范,履行责任。 |
课程培养学生的能力(教学目标) | 完成课程后,学生将具备以下能力: (1)掌握设计/开发与信息内容安全相关的解决方案; (2)能够使用与数字内容安全相关的技术工具; (3)能够基于所学知识合理分析数字内容的安全工程问题,评价内容安全解决方案对社会、健康、安全、法律以及文化的影响,并理解应承担的责任; (4)具备科学素养和社会责任感,能够在工程实践中理解并遵守职业道德和规范。 |
课程简介 | 信息内容安全是数字内容在技术、政治、法律、道德等层次上的安全要求,即信息内容在技术上是可靠的,在政治上是健康的,在法律上是符合国家法律法规的,在道德上是符合优良传统的。通过本课程的学习,使学生掌握信息内容安全中的基本概念、基本理论和基本技术。主要教学内容包括:信息内容安全的概念,信息加密技术,消息认证与数字签名,信息隐藏与数字水印,数字取证技术,文本内容安全,数字图像内容安全,数字音频内容安全,数字视频内容安全,数据库安全等。 |
主要仪器设备与软件 | 主要仪器设备:可上网的计算机 主要软件:Windows操作系统,MicrosoftVisualC++, Matlab |
实验报告 | 按照学校实验报告格式完成各个实验报告。 |
考核方式 | 本课程考核方式为课堂出勤、实验报告和实验课表现,成绩比例为: 课堂出勤:20% 实验课表现:20% 实验报告:60% |
教材、实验指导书及教学参考书目 | 教 材:
参考书:
3、马民虎,互联网信息内容安全管理教程. 中国人民公安大学出版社,2007 |
制定人及发布时间 | 吴昊天 2019/04/14 |
《信息内容安全》实验教学内容与学时分配
实验项目编号 | 实验项目名称 | 实验学时 | 实验内容提要 | 实验类型 | 实验要求 | 每组人数 | 主要仪器设备与软件 |
1 | 用于图像内容验证的脆弱水印 | 4 |
在命令行下验证被篡改的图像,并观察验证结果图像。 | 综合性 | 必做 | 1 | 主要仪器设备:可以上网的计算机 主要软件:Windows 系列操作系统,Microsoft Visual C++ 2008,MATLAB |
2 | JPEG图像隐写与隐写分析 | 4 |
采用已有的隐写分析程序,对库中的JPEG图像图像进行隐写分析。 | 综合性 | 必做 | 1 | 主要仪器设备:可以上网的计算机 主要软件:Windows 系列操作系统,MATLAB |
3 | 图像可逆数据隐藏 | 4 |
从图像中提取隐藏的数据,并恢复原始图像。 | 综合性 | 必做 | 1 | 主要仪器设备:可以上网的计算机 主要软件:Windows 系列操作系统,Microsoft Visual C++ 2008 |
4 | 基于文本的特征串匹配 | 4 |
返回查询结果。 | 综合性 | 必做 | 1 | 主要仪器设备:可以上网的计算机 主要软件:Windows 系列操作系统,Microsoft Visual C++ 2008 |
“Information Content Security” Syllabus
Course Code | 045101951 |
Course Title | Information Content Security |
Course Category | Specialty-related Course |
Course Nature | Elective Course |
Class Hours | Total Hours: 48 Experimental Hours: 16 Internship hours: 0 Other hours: 0 |
Credits | 2.5 |
Semester | the 6th semester |
Institute | Computer Science and Engineering |
Program Oriented | Information security and the related computer major |
Teaching Language | Chinese |
Prerequisites | Cryptography and Security Protocol |
Student Outcomes (Special Training Ability) | 3. Designing and Developing Solutions: with the ability to design the solutions to complex and specific engineering problems in information security, to have an innovative sense in the design phase by considering the factors of society, health, safety, law and culture. 5. Applying the Modern Tools: with the ability to develop, select and use the appropriate techniques, resources, and modern tools and IT tools, including prediction and simulation, to solve the complex engineering activities in information security and understand the limitations. 6. Engineering and Society: with the ability to reasonably analyze and evaluate the impacts of professional engineering practice and solutions to the complex engineering problems to society, health, safety, law and culture issues by using the background knowledge of information security engineering, to understand the consequent responsibility. 8. Professional Regulations: to understand the humanity science and have the sense of social responsibility, be able to responsibly understand and abide the professional ethics and regulations in engineering practice. |
Teaching Objectives | Students will achieve the following abilities after completing the course study: 1. Capable of designing and developing the solutions related to information content security; 2. Capable of using the technical tools related to information content security; 3. With the ability to reasonably analyze the digital content security engineering problems, to evaluate the impacts of professional practices and solutions to society, health, safety, law and culture, and to understand the consequent responsibility. 4. To have scientific quality and sense of social responsibility and be able to responsibly understand and abide the professional ethics and regulations in engineering practice. |
Course Description | The course of Information Content Security focuses on the security requirements of information content in the aspects of technique, politic, law and moral. That is, the information content is reliable in the implementation techniques, correct in politics, conforming to the state laws and regulations, and according with the good traditions in moral. Through studying this course, students will understand the basic concepts, theories and techniques in information content security. The course content includes the following chapters: basic concept of information content security, information encryption techniques, message authentication and digital signature, information hiding and digital watermarking, digital forensics, text content security, digital image content security, digital audio/video content security, and database security. |
Instruments and Equipments | Instruments: any computer that connected to Internet Equipment: Windows Operating System, Microsoft Visual C++, Matlab |
Experiment Report | Implement all of them according to the format of the report from University. |
Assessment | Attendance: 20% Class performance: 20% Experiment report:60% |
Teaching Materials and Reference Books | Textbook: 1.彭飞,龙敏,刘玉玲,数字内容安全原理与应用. 清华大学出版社. 2012 Reference Book: 1.周学广,任延珍,孙艳,张立强,信息内容安全. 武汉大学出版社. 2012 2.李建华,信息内容安全管理及应用. 机械工业出版社. 2010 3.马民虎,互联网信息内容安全管理教程. 中国人民公安大学出版社,2007 |
Prepared by Whom and When | By WU Haotian on 2019/04/14 |
“Information Content Security” Experimental Teaching Arrangements
No. | Experiment Item | Class Hours | Content Summary | Category | Requirements | Number of Students Each Group | Instruments, Equipment and Software |
1 | Fragile watermarking for image content verification | 4 | 1.Open the project with Microsoft Visual C++; 2. Write the code to implement the embedding and image content verification with a fragile watermark; 3. Use image editing software to modify the image with the hidden watermark; 4. Test the modified image by extracting the hidden watermark. | Comprehensive | Compulsory | 1 | Instruments: computers connected to Internet, Equipment: Windows Operating System, Microsoft Visual C++ 2008, MATLAB |
2 | Steganography and steganalysis on JPEG images | 4 | 1.Open the m files to read JPEG images; 2.Visit the block DCT coefficients; 3. Run the JPEG steganography program; 4.Use the four steganalysis algorithms to detect the hidden data. | Comprehensive | Compulsory | 1 | Instruments: computers Equipment: Windows Operating System, MATLAB |
3 | Image reversible data hiding | 4 | 1.Open the project with Microsoft Visual C++; 2.Open and save the images with the project; 3.Perform reversible data hiding in images according to the experiment requirements; 4.Extract the hidden data and recover the original image. | Comprehensive | Compulsory | 1 | Instruments: computers Equipment: Windows Operating System, Microsoft Visual C++ 2008 |
4 | Text based feature string matching | 4 | 1.Open the project with Microsoft Visual C++; 2.Extract the feature string from the input texts and set up the dictionary; 3. Match the inquired keywords with the words in the dictionary; 4. Return the matching results. | Comprehensive | Compulsory | 1 | Instruments: computers Equipment: Windows Operating System, Microsoft Visual C++ 2008 |