Cover Pages
description
Transcript of Cover Pages
REPORT ON PROJECT PART I
AUTHENTICATION OF SECRET DATA USING VIDEO STEGANOGRAPHY
SUBMITTED TO UNIVERSITY OF PUNEFOR PARTIAL FULFILLMENT
OF THE REQUIREMENTS FOR THE DEGREE OF
BACHELOR OF ENGINEERINGIn
Electronics and Telecommunication
ByGitanjali GhadgeAkshay Kadam
Sanjeevani Kamble
DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION PUNE INSTITUTE OF COMPUTER TECHNOLOGY
PUNE – 43
OCTOBER 2014
Department of Electronics and Telecommunication Engineering
Pune Institute of Computer Technology, Pune – 43
CERTIFICATE
This is to certify that the Project Part I Report entitled
“AUNTHENTICATION OF SECRET DATA USING VIDEO STEGANOGRAPHY”
has been successfully completed by
Gitanjali S. Ghadge (4327)
Akshay V. Kadam (4336)
Sanjeevani R. Kamble (4337)
towards the partial fulfillment of the degree of Bachelor of Engineering in Electronics and
Telecommunication as awarded by the University of Pune, at Pune Institute of Computer
Technology during the academic year 2014-15.
Mr S. K. MOON Prof. Dr. Y. Ravinder Project
Guide HOD, E&TC Dept.
ACKNOWLEDGEMENTS
The progress of any project is due to the relentless effort of many who take an interest in
working together and thus helps it to grow richer. It gives us an immense pleasure to present a
written testimony of our knowledge & to express our gratitude towards the people who were a
part of this project in numerous ways, people who have given an unending support right from the
stage the idea .
We sincerely acknowledge that progress of project we have made, would not have been
possible without sincere co-operation of the staff members. We express our sincere thanks to our
project guide, Prof. S. K. Moon for sparing his valuable time and expert guidance that he gave
us.
We are sincerely thankful to the Principal of PICT, Pune and Head of Electronics and
Telecommunication department Prof. Dr. Y. Ravinder and our project coordinator Prof. R.C.
Jaiswal who have provided us this opportunity to create and learn something new.
We also thank everybody, who directly or indirectly helped us to complete our
project.
Gitanjali S. Ghadge (4327)
Akshay V. Kadam (4336)
Sanjeevani R. Kamble (4337)
CONTENTS
Abstract I
List of Acronyms II
List of Symbols III
List of Figures IV
List of Tables V
1 Introduction 1-4
1.1 Background 1
1.2 Relevance 1
1.3 Literature Survey 2
1.4 Motivation 3
1.5 Problem definition 3
1.6 Scope and objective 3
1.7 Technical approach 4
1.6 Organization of the Report 4
2 Theoretical Details 5-12
2.1 Introduction 5
2.2 Steganography 5
2.3 Data Hiding in Video 11
2.4 Ad EMD 11
3 Block Diagram with Working in Detail 12-16
4 Progress of Project and Discussion 17-21
5 Conclusions 22
6 Future Plan 23
References 24
ABSTRACT
Security in transmission and storage of digital images has it is importance in today’s
image communication and confidential video conferencing. Due to the increase use of images in
industrial process, it is essential to protect the confidential image data from unauthorized access.
Image and video encryption have application in various fields including internet communication,
multimedia system, medical imaging, Tele-medicine and military communication.
Steganography which literally means covered writing is defined as hiding the secret
message within a cover-medium in such a way that others cannot discern the presence of the
hidden message. In our project we are taking video as an embedding media. We are extracting
frames from video and taking one frame for hiding data. We are using ADAPTIVE EMD
algorithm for hiding message.
At the receiver side receiver’s thumb impression is used for authentication , if that
matches then that authorized user can be able to extract the data . The AdEMD approaches are
the anti-forensics Steganography system with the satisfactions of flexibility, adaptability,
capacity and imperceptibility.
Abbreviations and Acronyms
BER Bit Error Rate
SNR Signal To Noise Ratio
PSNR Power Signal To noise Ratio
LSB Least Significant Bit
EMD Exploiting Modification Direction
Ad-EMD Adaptive EMD
List of FiguresII
Fig .3.1 Block diagram of TX
Fig .3.2 Block diagram of RX
Fig .4.1 Original and stego images of LSB replacement algorithm
Fig .4.2 Original and recovered secret image of LSB replacement algorithm
Fig .4.3 Original and stego images of improved EMD algorithm
Fig .4.4 Original and recovered secret image of improved EMD algorithm
List of Tables
4.1 Analysis of different algorithm of 256*256 size
IV