You are on page 1of 5

1.

Group Id
2

2. Project Title
Use of Hybrid Fuzzy Neural Networks for Advanced Steganography

3. Project Option
Internal Project

4. Internal guide
Prof. V. S. Tidke

5. Sponsorship and external guide


6. Technical Keyword
6.1
Steganography : It is the hiding of a secret message within an
ordinary message and the extraction of it at its destination.
6.2
Pixel : The Pixel is the basic unit of programmable color on a
computer display or in a computer image.
6.3
AES : AES (acronym of Advanced Encryption Standard) is a symmetric
encryption algorithm. AES was designed to be efficient in both hardware and
software, and supports a block length of 128 bits and key lengths of 128, 192,
and 256 bits.
6.4
SPIHT : Set partitioning in hierarchical trees (SPIHT) is an image
compression algorithm that exploits the inherent similarities across the
subbands in a wavelet decomposition of an image.
6.5
ANN : An artificial neuron network (ANN) is a computational model
based on the structure and functions of biological neural networks. Information
that flows through the network affects the structure of the ANN because a
neural network changes - or learns, in a sense - based on that input and output.
6.6
LSB :
A pseudorandom number generator (PRNG), also known as a
deterministic random bit generator (DRBG), is an algorithm for generating a
sequence of numbers whose properties approximate the properties of
sequences of random numbers.
6.7
Fuzzy Neural Network : A fuzzy neural network or neuro-fuzzy system
is a learning machine that finds the parameters of a fuzzy system (i.e., fuzzy
sets, fuzzy rules) by exploiting approximation techniques from neural networks.
6.8
Back Propogation Learning : Backpropagation, an abbreviation for
"backward propagation of errors", is a common method of training artificial
neural networks used in conjunction with an optimization method such as
gradient descent. The method calculates the gradient of a loss function with
respect to all the weights in the network.

6.9
PSNR : Peak signal-to-noise ratio, often abbreviated PSNR, is an
engineering term for the ratio between the maximum possible power of a
signal and the power of corrupting noise that affects the fidelity of its
representation.

7. Problem statement
To implement an Hybrid Fuzzy Neural Network (HFNN) for advanced steganography

for embedding secret data using Least Significant Bit (LSB) substitution method to
maintain confidentiality of information sharing over the network.

8. Abstract
Image steganography has been one of the emerging research areas. As the
field of information technology is advancing, the need of information security is
increasing day by day. Steganography is a widely used communication method
into days scenario which involves sending secret information in appropriate
carriers. Since it has an interesting property of concealing the message as well
as the existence of the message, steganography is on its evolutionary path to
unearth new platforms. As the field of stego-analysis is growing exponentially,
the need of developing strong stenographic algorithms is also growing. Since
the use of steganography is spreading across various fields, the goal of
increasing the embedding capacity, security and image quality is being major
concerns. In this synopsis a new image stenographic method suggested which
is based on random selection of pixels for secret data embedding and post
processing the stego-image using Hybrid Fuzzy Neural Networks. The pixels
where secret data is to be embedded is selected randomly using a pseudo
random key. In the selected pixels the last 2 or 3 bits are used for hiding. The
resultant degradation in the quality of stego-image is handled by an efficient
pixel adjustment process with the use of fuzzy neural networks.

9. Goals and Objective


The main goal of the system is to securely hide the secret data in cover
medium by using Least Significant Bit (LSB) substitution method with highly
secured Advanced Encryption Standard (AES) encryption algortihm & the
objective is to use of Hybrid Fuzzy Neural Network (HFNN) to produce a good
quality stego image which prevents any statistical, visual attack & even any
Image manipulation attack (like cropping, flipping & rotating)

10. Relevant mathematics associated with the Project


System Description:
Input: Cover Image, Stego-Image
Output: Secret Image
Constraints: Class StegoImage, Embedding
Improvement Phase, Java RMI, attack checking
Function:
Error function

Phase,

Quality

Testing Image Quality function

Mathematical Formulation:
Suppose that are the inputs. Let A1, A2 and B1, B2 be the linguistic
values for each input variable. The linguistic states can be expressed
equations

Hidden layer processing

Then the product of the normalized firing level and the individual rule
outputs are calculated

The SSIM algorithm is used to measure the similarity between two


identical images
Success Conditions:
Secret Image with good quality
Failure Conditions:
Blur Secret Image i.e. Bad Image quality

11. Name of Conference/Journals where papers can be


published
1. Natarajan Education Society (NES) innovation awards 2016, Nashik
2.
3.
4.

12. Review of conference/journals paper support idea


1. Review of Steganography in digital media, International Journal of Science &
Research (IJSR)
2. Embedded a large amount of information using high secure neural based
steganography algorithm ,International Journal of Information & Communication
Engineering.
3. Enhancing the security and quality of LSB based Image Steganography,
Computational Intelligence & Communication Network (CICN)
4.

5.
6.

13. Plan of project executionThe plan of project is started form 15th June 2016.
Sr.

Week

Work done

1st week

Selection of appropriate domain and searching of


project topic

2nd week

Literature surveyon project topic

3rd week

Search of base paper related to chosen project


topics and understood it

4th week

Got project topic approvedproject topic with the help


of base paper by staff

5Th week

Study of related base papers, journals and research


works

6th week

Started preparation of literature survey paper

7th week

Started with creation of flow chart, abstract,


computational model

8th week

Searched for other related softwares and its


limitations

9th week

Searched for hardware as well as software


availability and determined cost estimation

10

10th week

Searched for extra techniques and algorithms


related to project topic

11

11th week

Discuss whole project work with respective guide

12

12th week

Started preparation of partial project report

You might also like