Вы находитесь на странице: 1из 9

REPORT ON PROJECT PART I

AUTHENTICATION OF SECRET DATA USING


VIDEO STEGANOGRAPHY
SUBMITTED TO UNIVERSITY OF PUNE
FOR PARTIAL FULFILLMENT
OF THE REQUIREMENTS FOR THE DEGREE OF

BACHELOR OF ENGINEERING
In

Electronics and Telecommunication

By

Gitanjali Ghadge
Akshay Kadam
Sanjeevani Kamble

DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION


PUNE INSTITUTE OF COMPUTER TECHNOLOGY
PUNE 43
OCTOBER 2014

Department of Electronics and Telecommunication Engineering


Pune Institute of Computer Technology, Pune 43

CERTIFICATE

This is to certify that the Project Part I Report entitled


AUNTHENTICATION OF SECRET DATA USING VIDEO STEGANOGRAPHY
has been successfully completed by
Gitanjali S. Ghadge (4327)
Akshay V. Kadam (4336)
Sanjeevani R. Kamble (4337)
towards the partial fulfillment of the degree of Bachelor of Engineering in Electronics and
Telecommunication as awarded by the University of Pune, at Pune Institute of Computer
Technology during the academic year 2014-15.

Mr S. K. MOON
Guide

Prof. Dr. Y. Ravinder Project


HOD, E&TC Dept.

ACKNOWLEDGEMENTS

The progress of any project is due to the relentless effort of many who take an interest in
working together and thus helps it to grow richer. It gives us an immense pleasure to present a
written testimony of our knowledge & to express our gratitude towards the people who were a
part of this project in numerous ways, people who have given an unending support right from the
stage the idea .
We sincerely acknowledge that progress of project we have made, would not have been
possible without sincere co-operation of the staff members. We express our sincere thanks to our
project guide, Prof. S. K. Moon for sparing his valuable time and expert guidance that he gave
us.
We are sincerely thankful to the Principal of PICT, Pune and Head of Electronics and
Telecommunication department Prof. Dr. Y. Ravinder and our project coordinator Prof. R.C.
Jaiswal who have provided us this opportunity to create and learn something new.
We also thank everybody, who directly or indirectly helped us to complete our
project.

Gitanjali S. Ghadge (4327)


Akshay V. Kadam (4336)
Sanjeevani R. Kamble (4337)

CONTENTS

Abstract

List of Acronyms

II

List of Symbols

III

List of Figures

IV

List of Tables

Introduction

1-4

1.1

Background

1.2

Relevance

1.3

Literature Survey

1.4

Motivation

1.5

Problem definition

1.6

Scope and objective

1.7

Technical approach

1.6

Organization of the Report

Theoretical Details

5-12

2.1

Introduction

2.2

Steganography

2.3

Data Hiding in Video

11

2.4

Ad EMD

11

Block Diagram with Working in Detail

12-16

Progress of Project and Discussion

17-21

Conclusions

22

Future Plan

23

References

24

ABSTRACT
Security in transmission and storage of digital images has it is importance in todays
image communication and confidential video conferencing. Due to the increase use of images in
industrial process, it is essential to protect the confidential image data from unauthorized access.
Image and video encryption have application in various fields including internet communication,
multimedia system, medical imaging, Tele-medicine and military communication.
Steganography which literally means covered writing is defined as hiding the secret
message within a cover-medium in such a way that others cannot discern the presence of the
hidden message. In our project we are taking video as an embedding media. We are extracting
frames from video and taking one frame for hiding data. We are using ADAPTIVE EMD
algorithm for hiding message.
At the receiver side receivers thumb impression is used for authentication , if that
matches then that authorized user can be able to extract the data . The AdEMD approaches are
the anti-forensics Steganography system with the satisfactions
capacity and imperceptibility.

of flexibility, adaptability,

Abbreviations and Acronyms


BER

Bit Error Rate

SNR

Signal To Noise Ratio

PSNR

Power Signal To noise Ratio

LSB

Least Significant Bit

EMD

Exploiting Modification Direction

Ad-EMD

Adaptive EMD

II

List of Figures
Fig .3.1

Block diagram of TX

Fig .3.2

Block diagram of RX

Fig .4.1

Original and stego images of LSB replacement algorithm

Fig .4.2

Original and recovered secret image of LSB replacement algorithm

Fig .4.3

Original and stego images of improved EMD algorithm

Fig .4.4

Original and recovered secret image of improved EMD algorithm

List of Tables
4.1

Analysis of different algorithm of 256*256 size

IV

Вам также может понравиться