You are on page 1of 6

Check Sheet for BS Telecom Project Proposal and Topic Approval

1 Title Page
2 Table of contents
3 Problem Statement
4 Aims & Objectives
5 Literature Review
6 Methodology of Project
a) Theoretical Studies
b) Experimental Set Up
c) Method of Analysis
d) Result Expected
7 Utilization of Project Results
8 Work Schedule Plan

Certified that the Synopsis/Topic approval report is according to the items listed in Check
Sheet.

Project Members Roll Number

Name 1
Name 2
Name 3
Name 4
BS Project Proposal

Hiding Multiple pages in Color Image Using


Steganography Techniques

Submitted By

[Student name]

Supervisor
[Supervisor name]

Telecommunication Department of Information Technology

December, 2018

2
1. Project Overview

In present day to day life, effective data hiding methods are needed due to attack made on
data communication. This Project presents the technique for the above requirement. In this
proposed method, secret message is embedded within carrier audio file (.wav) .In the
transmitter end the output will be similar to the carrier with secret message embedded inside.
The hacker will be blinded by the transmitted signal. At the receiver end the original message
can be retrieved without any loss. The entire proposed system is simulated and their
corresponding waveforms prove the effectiveness of this method.
.
2. Introduction:

The main goal of steganography is to communicate securely in a completely


undetectable manner and to avoid drawing suspicion to the transmission of a hidden
data. It is not only prevents others from knowing the hidden information, but it also
prevents others from thinking that the information even exists. If a steganography
method causes someone to suspect there is a secret information in a carrier
medium, then the method has failed . The basic model of Audio steganography
consists of Carrier (Audio file),. Carrier is also known as a cover-file, which conceals
the secret information.. Message is the data that the sender wishes to remain it
confidential. Message can be plain text, image, audio or any type of file.
.
Implementation

In this project a robust method of imperceptible audio, text and image hiding is proposed.
This system is to provide a good, efficient method for hiding the data from hackers and sent
to the destination in a safe manner. Thus it can be concluded that Bit Exchange Method and
indexing in proposed method can be used which will bring various advantages which can be
used for a number of purposes other than covered communication or deniable data storage
Software approach

Software Used for this project is Matlab

3
.

5. Work Schedule Plan

Collection of literature Two Weeks


Study of Literature Two Weeks
Analysis of Proposed Scheme One Month
Preparation of Scheme/Model One Month
Implementation of Scheme/Model One Month
Analysis and Simulation One Month
Result Formulation Two Weeks
Final Write-up & Thesis Submission Two Weeks

6.1 Proposed Time Schedule

Feb March April May June July


Activity
11 11 11 11 11 11
Collection of Literature

Study of Literature
Analysis of Proposed
Scheme
Preparation of Schemes /
Model
Implementation of
Schemes/Model

4
Analysis & Simulation

Result Formulation
Final Write-up & Thesis
Submission

6. Supervisor’s Comments

5
Signature of Supervisor

You might also like