0% found this document useful (0 votes)
51 views13 pages

PPR 1

progress report paper for major project
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views13 pages

PPR 1

progress report paper for major project
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Department of Computer Science & Engineering

GUIDELINES FOR B. TECH. PROJECT


These guidelines for successful completion of B.Tech. Projects are to facilitate departments in
effective and uniform regulation of projects being carried out by undergraduate students in 7th
semester.

NUMBER OF COPIES TO BE SUBMITTED FOR EVALUATION:

Pls submit One hard copy in Spiral Binding of PPR-1 of the Project without
error, Signed by all group members and checked and approved by your respective
Supervisor and submit this hard copy to respective Project Coordinator till 10 th November
2024. If the Supervisor / Project Coordinator found it is not as per suggested
format then you need correct it as per suggestion and submit it again within
next 3 days.

Text :

The text should be typed in 12 font size Times New Roman style in 1.5 spacing on one side of
A4 size page (Executive Bond) only. The Captions for figures should be typed at the its bottom
for example 4th figure in Chapter 3 should be captioned as Figure. 3.4 Title of Figure. The
captions for tables should be typed at its top for example 7 th table in Chapter 3 should be
captioned as Table. 3.7 Title of Table. The text format in the chapter will be
⮚ Main heading Size : 16 (Bold)
⮚ Sub heading 1.1: 14 (Bold)
⮚ Subtitle .1.1.1: 12 (Bold)
⮚ Text(script): 12

Numbering of Chapters, Sections and Sub-sections.

The numbering of Chapters, division and sub-divisions should be done using Arabic numerals
only and further decimal notation should be used for numbering the divisions and subdivisions
within a chapter. For examples sub-division 4 under division 3 belonging to chapter 2 should be
numbered as 2.3.4.

Equations appearing in each Chapter should be numbered serially, the numbering commencing
fresh for each Chapter or Appendix. For example, an equation appearing in Chapter 2, if it
happens to be the eighth equation in that Chapter 2 should be numbered (2.8). While referring
this equation in the body of the project it should be referred to as Equation (2.8).
List of References / Bibliography

Any work of other researchers, if used either directly or indirectly, the origin of the material thus
referred to at appropriate places in the report should be indicated. The citation may assume any
of the standard form (preferably ASCE, ASCE, IEEE, or other international Journal Publishers
such as Elsevier, Kluwer, Pergamon etc.). For more details the students may contact their
respective guides.

Electronic Documents E-books


[1] L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2nd ed. Reading,
MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.

Article in Online Encyclopedia


[2] D. Ince, “Acoustic coupler,” in A Dictionary of the Internet. Oxford University Press, [online
document], 2001. Available: Oxford Reference Online, http://www.oxfordreference.com
[Accessed: May 24, 2007].

Journal Article Abstract (accessed from online database)


[1] M. T. Kimour and D. Meslati, “Deriving objects from use cases in real-time embedded
systems,” Information and Software Technology, vol. 47, no. 8, p. 533, June 2005. [Abstract].
Available: ProQuest, http://www.umi.com/proquest/. [Accessed November 12, 2007].

Journal Article in Scholarly Journal (published free of charge on the Internet)


[2] A. Altun, “Understanding hypertext in the context of reading on the web: Language learners’
experience,” Current Issues in Education, vol. 6, no. 12, July, 2005. [Online serial]. Available:
http://cie.ed.asu.edu/volume6/number12/. [Accessed Dec. 2, 2007].

Newspaper Article from the Internet


[3] C. Wilson-Clark, “Computers ranked as key literacy,” The Atlanta Journal Constitution, para.
3, March 29, 2007. [Online], Available: http://www.thewest.com.au. [Accessed Sept. 18, 2007].

Internet Documents

Professional Internet Site


[1] European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB):
Implementation guide for DVB terrestrial services; transmission aspects,” European
Telecommunications Standards Institute, ETSI-TR-101, 2007. [Online]. Available:
http://www.etsi.org. [Accessed: Nov. 12, 2007].

General Internet Site


[2] J. Geralds, “Sega Ends Production of Dreamcast,” vnunet.com, para. 2, Jan. 31, 2007.
[Online]. Available: http://nli.vnunet.com/news/1116995. [Accessed Sept. 12, 2007].

Print Documents Books

Books

[4] R. Hayes, G. Pisano, and S. Wheelwright, Operations, Strategy, and Technical Knowledge.
Hoboken, NJ: Wiley, 2007
Page Dimensions and Margin

The dimensions of the Spiral binding report should be Standard A4 size (297mm x 210mm)
paper, may be used for preparing the copies. The report should have the following page margins:
Top and Bottom edge : 25 mm (1 inches) Left and right side : 25 mm (1inches)

Page Numbering

All pages numbers should be typed at the center of page bottom. The preliminary pages of the
Project (such as Title page, Table of Contents, List of tables and figures, Notations,
Abbreviations etc.) should be numbered in lower case Roman numerals.

Page Type:

The project report should print on white paper with Spiral binding.
Size of Report

The size of Project report should not exceed 40 Pages of typed matter reckoned from the First
page of Chapter 1 to the last page.

Sequence of Report:

1. Cover Page
2. Progress Report form
3. Synopsis(2-3 Pages)
4. Table of Contents along with page numbers
5. List of Figures
6. List of tables
7. List of Symbols, Abbreviations
8. Chapter 1: Introduction
9. Chapter-2: Back Ground and related work
10.Chapter-3: Hardware and Software Requirement
11.Chapter-4: SDLC Methodologies
12.Chapter 5: DFD /ER Diagram/ wireframe/Application Architecture
13.References
Chapter 1: Introduction : This chapter cover the Introduction of the Project,
objective, motivation, existing technologies/tool/softwares, Problem definition etc.
( minimum 3-7 Pages)

Chapter 2: Back Ground and related work : This chapter cover the solution of
the related problem suggested by various authors in their research papers. Also
prepare a table of comparison of various methodology suggested by authors.
(Minimum 3-4 Pages). Sample for chapter 2 as below
Sr Paper Name Author Publi catio n Methodology
.
Year
N
o.
1 Recommender System N. Vaidya 2017 Challenges and Benefits
and A. R.
the need of the of Recommendation
Khachane
ecommerce ERA System and building
proposed
system of own.
2

3 2013 Advantages of using


Towards graphical C. C.
distance graph
models for text Aggarwal and
processing, P. Zhao

C. C. Aggarwal and P. Zhao [3], author introduced a new paradigm for text
representation and processing called distance graph representations. Distance graph
representations keep information about the relative ordering as well as distance
among the words in the graphs and provide a much more affluent representation in
terms of sentence structure of the provided data. Knowledge discovery from text is
possible with help of distance graph representation which is not possible with the
use of a pure vector-space representation. Use of the distance graph representation
provides significant advantages from an effectiveness perspective.
Chapter-3: Hardware and Software Requirement : Write down in brief about
the Hardware and Software requirements of your project. ( minimum 1-2 Pages).

Chapter-4: SDLC Methodologies: Students should write the various popular


SDLC methodology in brief and in details explain the methodology used in project
and how it effective for your project. (minimum 3-5 Pages).

Chapter 5: DFD /ER Diagram/ wireframe/Application Architecture: Students


should explain their Project DFD/ER Diagram/Application architecture ( As per
needed in Project) in details with various levels of DFD and ER diagrams are using
in Project. (minimum 3-4 Pages).

Sample Format is attached:


Mid Semester Project Progress Report
on
Title of Project
Submitted in partial fulfillment for award of
BACHELOR OF TECHNOLOGY
Degree
In
COMPUTER SCIENCE & ENGINEERING

2024-25
Under the Guidance of: Submitted By:

Name of Supervisor Names ( Univ. Roll Nos.)


Designation

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


RAJ KUMAR GOEL INSTITUTE OF TECHNOLOGY
5th K.M. STONE DELHI-MEERUT ROAD, GHAZIABAD

Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow


November 2024

Department of Computer Science & Engineering

Project Progress Report

1. Course : Bachelor of Technology


2. Semester : VIIth
3. Branch : Computer Science & Engineering
4. Project Title :
5. Details of Students:
S. No. Roll No. Name Role as Signature
1 Team Leader
2 Designer
3 Coder, Tester
4 Report

6. SUPERVISOR:

(Name of Supervisor)
Remarks from Project Supervisor:

…………………………………………………………………………………

……………………………………………………………………………………

…………………………………………………………………………………

● Note: Role can be Team Leader, Requirement Analyzer, Designer, Coder, Tester, Report
Preparation, Manual Preparation etc. Choose selective role in your Project as per team
member contribution.
SYNOPSIS
TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO.

SYNOPSIS iii
LIST OF TABLES ix
LIST OF FIGURES x

1. INTRODUCTION 1

1.1 OVERVIEW OF THE STEGANOGRAPHY PROCESS 4


1.1.1 DIFFERENT TYPES OF STEGANOGRAPHY 5
1.1.2 USES OF STEGANOGRAPHY 7
1.1.3 STEGANOGRAPHY AND ENCRYPTION 9
1.1.4 LIMITATION 10
1.1.5 METHODS OF DIGITAL STEGANOGRAPHY 11
1.1.5.1 IMAGES AS CARRIERS 12
1.1.5.2 AUDIO FILE CARRIERS 12
1.2 MOTIVATION 13

2. BACKGROUND AND RELATED WORK 14

2.1 TECHNIQUES FOR DATA HIDING 14


2.1.1 DATA HIDING IN STILL IMAGE 19
2.1.2 DATA HIDING IN AUDIO 21
2.1.3 PHASAE CODING 26
2.1.4 SPREAD SPECTRUM 26
2.1.5 ECHO DATA HIDING 27
2.2 AUDIO STEGANOGRAPHY 28
2.2.1 LSB BASED AUDI STEGANOGRAPHY 30
2.2.2 DATA HIDING USING BIT MODIFICATION 35
2.2.3 DATA HIDING BY TONE INSERTION 37
2.2.4 PHASE CODING 39
LIST OF TABLES

CHAPTER NO. TABLE NO. TITLE PAGE NO.

2 Table 2.1 Audio Stream with Encoded 32


4 Table 4.1 Guitar.wav 68
4 Table 4.2 Jhankar.wav 69
4 Table 4.3 Mohabatten.wav 70
4 Table 4.4 Pahalanasha.wav 70
4 Table 4.5 Mean Opinion Score MOS 72
LIST OF FIGURES

CHAPTER NO. TITLE PAGE NO.

1 Figure 1.1: Categories of Steganography 6


2 Figure 2.1: Microsoft RIFF File Format 23
2 Figure 2.2: Encoding Message HEY in 16 bit CD Quality
Audio steganography at LSB 31
2 Figure 2.3: Sampling of the size wave followed by
Quantization Process 32
2 Figure 2.4: Hiding 1 bit of image in 16 bit quantized audio
sample 33
2 Figure 2.5: Hiding 4 bit of Image in 16 bit Quantized audio signal 33
2 Figure 2.6 : Illustrated the original signal and encoded signal
of phase coding Technique. 39
CHAPTER 1

INTRODUCTION

Since the rise of the Internet, one of the most important factors of information
technology and communication has been the security of information. Cryptography was created
as a technique for securing the secrecy of communication and many different methods have been
developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is
sometimes not enough to keep the contents of a message secret, it may also be necessary to keep
the existence of the message secret. The technique used to implement this, is called
Steganography.
Steganography is the art and science of invisible communication. This is
accomplished through hiding information in other information, thus hiding the existence of the
communicated information. The word steganography is derived from the Greek words “stegos”
meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. In image
steganography the information is hidden exclusively in images. The idea and practice of hiding
information has a long history. In Histories the Greek historian Herodotus writes of a nobleman,
Histaeus, who needed to communicate with his son-in-law in Greece.
well-known channels greatly reduces the risk of information being leaked in transit. Hiding
information in a photograph of the company picnic is less suspicious than communicating an
encrypted file.

1.1 OVERVIEW OF THE STEGANOGRAPHY PROCESS

Although steganography is an ancient subject, the modern formulation of it is often


given in terms of the prisoner’s problem proposed by Simmons, where two inmates wish to
communicate in secret to hatch an escape plan. All of their communication passes through a
warden who will throw them in solitary confinement should she suspect any covert
communication.
Steganography
Fig 1.1 Categories of Steganography

Text Images Audio/ Video Protocol

You might also like