University of Derby: In-Course Assignment Specification
University of Derby: In-Course Assignment Specification
University of Derby: In-Course Assignment Specification
University of Derby
The School of Electronics, Computing and Mathematics
Anonymous Marking
The University of Derby has now implemented a general policy of anonymous marking and all
the Turnitin Submission system will hide your name from your tutors, until after moderation.
This module has an exemption due to the face-to-face nature of the formative reviews during
workshops and the face-to-face marking of your work. As a result, you MUST ensure that
you include your student number in the submission title of your work for formative review
and for the final submission of your completed report(s) or other components of a portfolio.
If you do not do this, it will be impossible for your tutor to provide any formative or
summative feedback during the face to face formative reviews and final marking, because they
will not be able to find your work and they may not be able to create the final mark for your
portfolio of work.
1
The School of Electronics, Computing and Mathematics
6CC543 Multimedia Security
In addition, you should not use your name on the title page, instead you should place your
student ID in the name field and you should only use the student number version of your
unimail (e.g. [email protected]). This ensures that the internal moderators cannot
identify you, thus ensuring that the moderation process is truly anonymous.
Plagiarism
A student is liable to be found guilty of plagiarism if any work presented for individual
assessment is found to contain the unacknowledged work of some other person or persons. If
this involves deliberate misrepresentation of material as the student’s own in an attempt to
deceive the examiners then the offence is very grave indeed.
All sources should be cited and all quotations from the works of other authors clearly identified
as such.
If a student’s work is found to contain verbatim (or near verbatim) quotation from the work of
other authors (including other students past or present) without clear acknowledgement, then
plagiarism has been committed whether or not the student intended to deceive the examiners”.
Level of Collaboration
NONE
The assignment should be carried out independently. That is, no collaboration is allowed.
You must submit one electronic copy of the report as well as one electronic copy of your
PowerPoint presentation onto Blackboard through Turnitin by the above deadlines.
The file names of the report and the presentation should include only your student number
as explained. Use the following format:
<Student No>_Assignment_2.pdf
<Student No>_Assignment_2.ppt
Example : 1234567_Assignment_2.pdf and 1234567_Assignment_2.ppt
2
The School of Electronics, Computing and Mathematics
6CC543 Multimedia Security
ASSIGNMENT
You are a member of a cyber security team in a company selling digital artistic images in the
online market. The company needs Digital Rights Management (DRM) systems for collecting
and managing copyrighted digital multimedia data including image, audio and video. Providing
copyright protection for the assets are also essential for a profitable, trustworthy and reliable
business.
You are asked to enhance current DRM with a digital watermarking system for copyright
protection of the digital assets. As a part of this activity you are asked to evaluate different
available watermarking methods under specific possible attack threats.
Based on your analyses and evaluations you are going to draw a conclusion which methods are
suitable for the desired watermarking system.
The knowledge acquired in the tutorials and the results obtained in the practical Labs will be
used in the assignment.
3. Evaluation:
You will provide an overall evaluation for the methods considering the methods
covered in the Labs as well as the selected method from the literature. Based on your
evaluation you will draw a conclusion for the method to be used as a copyright
protection mechanism for the company’s DRM system.
Report:
The word limit of the report is 2500 words, excluding the cover page, content page and reference
list. The structure of the report is as follows:
I. Introduction:
A brief introduction on the report.
II. Copyright Protection:
A. Evaluation of the Lab Results
You will evaluate the results obtained during Lab exercises by taking
into attacks considered in the experiments and answering the questions set in
the Labs.
3
The School of Electronics, Computing and Mathematics
6CC543 Multimedia Security
The methods will be compared and appropriate decision for the overall
system will be provided.
B. Watermarking Method
The selected method should be presented briefly considering embedding and
extracting watermark and its pros and cons should be discussed.
C. Overall Evaluation
All considered methods in II.A and II.B will be compared considering the
attacks and a conclusion for the copyright protection system for the DRM
should be drawn.
III. Conclusion:
A brief conclusion about the report should be presented.
IV. References:
You should use Harvard referencing system. All references should be cited in the
text appropriately.
Oral Presentation:
You will present their work using PowerPoint slides in Week 12 of the term (01 May 2020).
Each presentation last no more than 10 minutes following 5 minutes for questions and
answers.
The presentation will summarize your report including the key findings in the assignment.
You should pay attention to pros and cons of each products, your selection providing appropriate
justification, and your final multimedia security system design.
Marking Scheme:
The contributions of report and presentation to the final mark of this assignment are 80% and 20%,
respectively. Marking breakdown for the presentations are as follows:
Report:
Element Mark Allocation
Introduction 5%
Evaluation of the Lab Results 25%
Watermarking Method 30%
Overall Evaluation 10%
Conclusion 5%
Structure, Proof Reading and Referencing 5%
Total 80%
Presentation:
Element Mark Allocation
Confidence 3%
Conciseness and clarity of presentation 3%
Explanations 8%
Ability to answer questions fully 6%
Total 20%
4
The School of Electronics, Computing and Mathematics
6CC543 Multimedia Security
5
The School of Electronics, Computing and Mathematics
6CC543 Multimedia Security