Cover Pages

11
REPORT ON PROJECT PART I AUTHENTICATION OF SECRET DATA USING VIDEO STEGANOGRAPHY SUBMITTED TO UNIVERSITY OF PUNE FOR PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF BACHELOR OF ENGINEERING In Electronics and Telecommunication By Gitanjali Ghadge Akshay Kadam Sanjeevani Kamble DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION

description

how to make cover

Transcript of Cover Pages

Page 1: Cover Pages

REPORT ON PROJECT PART I

AUTHENTICATION OF SECRET DATA USING VIDEO STEGANOGRAPHY

SUBMITTED TO UNIVERSITY OF PUNEFOR PARTIAL FULFILLMENT

OF THE REQUIREMENTS FOR THE DEGREE OF

BACHELOR OF ENGINEERINGIn

Electronics and Telecommunication

ByGitanjali GhadgeAkshay Kadam

Sanjeevani Kamble

DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION PUNE INSTITUTE OF COMPUTER TECHNOLOGY

PUNE – 43

OCTOBER 2014

Page 2: Cover Pages

Department of Electronics and Telecommunication Engineering

Pune Institute of Computer Technology, Pune – 43

CERTIFICATE

This is to certify that the Project Part I Report entitled

“AUNTHENTICATION OF SECRET DATA USING VIDEO STEGANOGRAPHY”

has been successfully completed by

Gitanjali S. Ghadge (4327)

Akshay V. Kadam (4336)

Sanjeevani R. Kamble (4337)

towards the partial fulfillment of the degree of Bachelor of Engineering in Electronics and

Telecommunication as awarded by the University of Pune, at Pune Institute of Computer

Technology during the academic year 2014-15.

Mr S. K. MOON Prof. Dr. Y. Ravinder Project

Guide HOD, E&TC Dept.

Page 3: Cover Pages

ACKNOWLEDGEMENTS

The progress of any project is due to the relentless effort of many who take an interest in

working together and thus helps it to grow richer. It gives us an immense pleasure to present a

written testimony of our knowledge & to express our gratitude towards the people who were a

part of this project in numerous ways, people who have given an unending support right from the

stage the idea .

We sincerely acknowledge that progress of project we have made, would not have been

possible without sincere co-operation of the staff members. We express our sincere thanks to our

project guide, Prof. S. K. Moon for sparing his valuable time and expert guidance that he gave

us.

We are sincerely thankful to the Principal of PICT, Pune and Head of Electronics and

Telecommunication department Prof. Dr. Y. Ravinder and our project coordinator Prof. R.C.

Jaiswal who have provided us this opportunity to create and learn something new.

We also thank everybody, who directly or indirectly helped us to complete our

project.

Gitanjali S. Ghadge (4327)

Akshay V. Kadam (4336)

Sanjeevani R. Kamble (4337)

Page 4: Cover Pages

CONTENTS

Abstract I

List of Acronyms II

List of Symbols III

List of Figures IV

List of Tables V

1 Introduction 1-4

1.1 Background 1

1.2 Relevance 1

1.3 Literature Survey 2

1.4 Motivation 3

1.5 Problem definition 3

1.6 Scope and objective 3

1.7 Technical approach 4

1.6 Organization of the Report 4

2 Theoretical Details 5-12

2.1 Introduction 5

2.2 Steganography 5

2.3 Data Hiding in Video 11

2.4 Ad EMD 11

3 Block Diagram with Working in Detail 12-16

4 Progress of Project and Discussion 17-21

5 Conclusions 22

6 Future Plan 23

References 24

ABSTRACT

Page 5: Cover Pages

Security in transmission and storage of digital images has it is importance in today’s

image communication and confidential video conferencing. Due to the increase use of images in

industrial process, it is essential to protect the confidential image data from unauthorized access.

Image and video encryption have application in various fields including internet communication,

multimedia system, medical imaging, Tele-medicine and military communication.

Steganography which literally means covered writing is defined as hiding the secret

message within a cover-medium in such a way that others cannot discern the presence of the

hidden message. In our project we are taking video as an embedding media. We are extracting

frames from video and taking one frame for hiding data. We are using ADAPTIVE EMD

algorithm for hiding message.

At the receiver side receiver’s thumb impression is used for authentication , if that

matches then that authorized user can be able to extract the data . The AdEMD approaches are

the anti-forensics Steganography system with the satisfactions of flexibility, adaptability,

capacity and imperceptibility.

Abbreviations and Acronyms

Page 6: Cover Pages

BER Bit Error Rate

SNR Signal To Noise Ratio

PSNR Power Signal To noise Ratio

LSB Least Significant Bit

EMD Exploiting Modification Direction

Ad-EMD Adaptive EMD

List of FiguresII

Page 7: Cover Pages

Fig .3.1 Block diagram of TX

Fig .3.2 Block diagram of RX

Fig .4.1 Original and stego images of LSB replacement algorithm

Fig .4.2 Original and recovered secret image of LSB replacement algorithm

Fig .4.3 Original and stego images of improved EMD algorithm

Fig .4.4 Original and recovered secret image of improved EMD algorithm

List of Tables

Page 8: Cover Pages

4.1 Analysis of different algorithm of 256*256 size

IV