SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.



User guide



Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub


Higher Education Technical Challenges Hub: Module Specification

ICT28M3 Cryptography and Watermarking

pdf version of module specification

Download the module specification

pdf version of module specification








Module name:

Cryptography and Watermarking

Scope and form:

Elective; face to face

Duration (weeks; Hours/week):

15 weeks, 2h lectures/week and 2h lab/week; mid-term exam, seminar work, lab work

Type of assessment:

exams, assignments, seminar work

Qualified Prerequisites:

Programming Languages, Statistics and Mathematics for Engineering Departments

General module objectives:

The objective of this module to give students in-depth knowledge from the field of data protection and its role in assuring communication security

Topics and short description:

Introduction to data protection: purpose, goals and basic definitions.
Cryptography: basic concepts, modern algorithms, the role of keys, types of cryptographic algorithms and their use; security of cryptographic algorithms and techniques of attacks.
Data hiding: concept and goals of data hiding; modern approaches and algorithms; security of data hiding algorithms and procedures.
Digital watermarking: concept and goals of digital watermarks; modern approaches and algorithms; security of digital watermarking algorithms and procedures.
Usable aspect of data protection and related standards: implementation aspects; the role of cryptography and data hiding for assuring communication security and information systems’ security.
Practical aspects of data protection: security protocols and services; digital rights management and other practical aspects.

Learning outcomes:




Concept and process of data protection

Ability to use data protection concepts and techniques for protecting information and communications technology

Apply data protection techniques

Models of data protection deployment

Ability to deploy data protection in practice

Deploying data protection techniques

Adequate application and implementation of data protection methods

Ability to act in time in case of security holes

Implement data protection measures

Recommended literature:

N. Ferguson et al.: Cryptography Engineering - Design Principles and Practical Applications, Wiley Publishing, Indianapolis, 2011
W. Stallings: Cryptography and Network Security - Principles and Practice, 5th Edition, Prentice Hall, Boston, 2011
D. Hook: Beginning Cryptography With Java, Wiley Publishing, Indianapolis, 2005
P.K. Yuen: Practical Cryptology and Web Security, Addison Wesley, Boston, 2006
S. Katzenbeisser, F. A. P. Petitcolas: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishing, Boston, 2000