<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.devclub.in/index.php?action=history&amp;feed=atom&amp;title=SIL773</id>
	<title>SIL773 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.devclub.in/index.php?action=history&amp;feed=atom&amp;title=SIL773"/>
	<link rel="alternate" type="text/html" href="https://wiki.devclub.in/index.php?title=SIL773&amp;action=history"/>
	<updated>2026-04-09T07:34:07Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.devclub.in/index.php?title=SIL773&amp;diff=2355&amp;oldid=prev</id>
		<title>Prashantt492: Creating course page via bot</title>
		<link rel="alternate" type="text/html" href="https://wiki.devclub.in/index.php?title=SIL773&amp;diff=2355&amp;oldid=prev"/>
		<updated>2026-03-04T10:24:28Z</updated>

		<summary type="html">&lt;p&gt;Creating course page via bot&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox Course&lt;br /&gt;
| code = SIL773&lt;br /&gt;
| name = Digital Watermarking and Steganography&lt;br /&gt;
| credits = 3&lt;br /&gt;
| credit_structure = 3-0-0&lt;br /&gt;
| pre_requisites = &lt;br /&gt;
| overlaps = &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== SIL773 : Digital Watermarking and Steganography ==&lt;br /&gt;
Prerequisite(s) : COL106 Data Structures and Algorithms/ COL702 Advanced Data Structures Introduction to Information Hiding, Steganography and Watermarking, Digital Watermarking: Applications, techniques, models, watermarking detection techniques. Visible and invisible watermarks. Watermark security, digital watermark attacks, Steganography techniques in images, video, audio and documents, Security in Steganography, Courses of Study 2024-2025 363Pure key Steganography, Private key Steganography and Public key Steganography, Steganalysis - detection, extraction &amp;amp; recovery of message. SIL779 Data privacy 3 Credits (3 -0-0) Information Security and Privacy: the big picture, A gentle introduction to cryptography, Certificates, PKI, Decentralized Trust Management, Authentication – incl. authentication infrastructure and protocols, Information Security: Legal landscape, Cybercrime, Information Privacy: Concepts and Regulatory Landscape, Privacy Enhancing Technologies, Methods of tracking and de-identification (Breaking users&amp;#039; privacy: packet sniffing.,First-party data collection; third-party data collection: how ad networks work; surveillance by ISPs., Tracking users: cookie tracking, ads., Understanding privacy threat models.), Information Security as Risk management,Trusted Computing, Mobile Security, Privacy and Big Data, Web Attacks, Systems Security, Social Networking and Privacy, Usable Security and Privacy.&lt;/div&gt;</summary>
		<author><name>Prashantt492</name></author>
	</entry>
</feed>