Академический Документы
Профессиональный Документы
Культура Документы
BACHELOR OF ENGINEERING
In
By
Gitanjali Ghadge
Akshay Kadam
Sanjeevani Kamble
CERTIFICATE
Mr S. K. MOON
Guide
ACKNOWLEDGEMENTS
The progress of any project is due to the relentless effort of many who take an interest in
working together and thus helps it to grow richer. It gives us an immense pleasure to present a
written testimony of our knowledge & to express our gratitude towards the people who were a
part of this project in numerous ways, people who have given an unending support right from the
stage the idea .
We sincerely acknowledge that progress of project we have made, would not have been
possible without sincere co-operation of the staff members. We express our sincere thanks to our
project guide, Prof. S. K. Moon for sparing his valuable time and expert guidance that he gave
us.
We are sincerely thankful to the Principal of PICT, Pune and Head of Electronics and
Telecommunication department Prof. Dr. Y. Ravinder and our project coordinator Prof. R.C.
Jaiswal who have provided us this opportunity to create and learn something new.
We also thank everybody, who directly or indirectly helped us to complete our
project.
CONTENTS
Abstract
List of Acronyms
II
List of Symbols
III
List of Figures
IV
List of Tables
Introduction
1-4
1.1
Background
1.2
Relevance
1.3
Literature Survey
1.4
Motivation
1.5
Problem definition
1.6
1.7
Technical approach
1.6
Theoretical Details
5-12
2.1
Introduction
2.2
Steganography
2.3
11
2.4
Ad EMD
11
12-16
17-21
Conclusions
22
Future Plan
23
References
24
ABSTRACT
Security in transmission and storage of digital images has it is importance in todays
image communication and confidential video conferencing. Due to the increase use of images in
industrial process, it is essential to protect the confidential image data from unauthorized access.
Image and video encryption have application in various fields including internet communication,
multimedia system, medical imaging, Tele-medicine and military communication.
Steganography which literally means covered writing is defined as hiding the secret
message within a cover-medium in such a way that others cannot discern the presence of the
hidden message. In our project we are taking video as an embedding media. We are extracting
frames from video and taking one frame for hiding data. We are using ADAPTIVE EMD
algorithm for hiding message.
At the receiver side receivers thumb impression is used for authentication , if that
matches then that authorized user can be able to extract the data . The AdEMD approaches are
the anti-forensics Steganography system with the satisfactions
capacity and imperceptibility.
of flexibility, adaptability,
SNR
PSNR
LSB
EMD
Ad-EMD
Adaptive EMD
II
List of Figures
Fig .3.1
Block diagram of TX
Fig .3.2
Block diagram of RX
Fig .4.1
Fig .4.2
Fig .4.3
Fig .4.4
List of Tables
4.1
IV