0% found this document useful (0 votes)
22 views13 pages

Project Report Format

Hellloo

Uploaded by

dkf250090
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views13 pages

Project Report Format

Hellloo

Uploaded by

dkf250090
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Department of Computer Science & Engineering

GUIDELINES FOR B. TECH. PROJECT


These guidelines for successful completion of B.Tech. Projects are to facilitate departments in
effective and uniform regulation of projects being carried out by undergraduate students in 7th
semester.

NUMBER OF COPIES TO BE SUBMITTED FOR EVALUATION:

Pls submit One hard copy in Spiral Binding of Project Report without error,
Signed by all group members and checked and approved by your respective Supervisor
and submit this hard copy to respective Project Coordinator.

Text :
The text should be typed in 12 font size Times New Roman style in 1.5 spacing on one side of
A4 size page (Executive Bond) only. The Captions for figures should be typed at the its bottom
for example 4th figure in Chapter 3 should be captioned as Figure. 3.4 Title of Figure. The
captions for tables should be typed at its top for example 7th table in Chapter 3 should be
captioned as Table. 3.7 Title of Table. The text format in the chapter will be
 Main heading Size : 16 (Bold)
 Sub heading 1.1: 14 (Bold)
 Subtitle .1.1.1: 12 (Bold)
 Text(script): 12

Numbering of Chapters, Sections and Sub-sections.


The numbering of Chapters, division and sub-divisions should be done using Arabic numerals
only and further decimal notation should be used for numbering the divisions and subdivisions
within a chapter. For examples sub-division 4 under division 3 belonging to chapter 2 should be
numbered as 2.3.4.

Equations appearing in each Chapter should be numbered serially, the numbering commencing
fresh for each Chapter or Appendix. For example, an equation appearing in Chapter 2, if it
happens to be the eighth equation in that Chapter 2 should be numbered (2.8). While referring
this equation in the body of the project it should be referred to as Equation (2.8).
List of References / Bibliography
Any work of other researchers, if used either directly or indirectly, the origin of the material thus
referred to at appropriate places in the report should be indicated. The citation may assume any
of the standard form (preferably ASCE, ASCE, IEEE, or other international Journal Publishers
such as Elsevier, Kluwer, Pergamon etc.). For more details the students may contact their
respective guides.

Electronic Documents E-books


[1] L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2nd ed. Reading,
MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.

Article in Online Encyclopedia


[2] D. Ince, “Acoustic coupler,” in A Dictionary of the Internet. Oxford University Press, [online
document], 2001. Available: Oxford Reference Online, http://www.oxfordreference.com
[Accessed: May 24, 2007].

Journal Article Abstract (accessed from online database)


[1] M. T. Kimour and D. Meslati, “Deriving objects from use cases in real-time embedded
systems,” Information and Software Technology, vol. 47, no. 8, p. 533, June 2005. [Abstract].
Available: ProQuest, http://www.umi.com/proquest/. [Accessed November 12, 2007].

Journal Article in Scholarly Journal (published free of charge on the Internet)


[2] A. Altun, “Understanding hypertext in the context of reading on the web: Language learners’
experience,” Current Issues in Education, vol. 6, no. 12, July, 2005. [Online serial]. Available:
http://cie.ed.asu.edu/volume6/number12/. [Accessed Dec. 2, 2007].

Newspaper Article from the Internet


[3] C. Wilson-Clark, “Computers ranked as key literacy,” The Atlanta Journal Constitution, para.
3, March 29, 2007. [Online], Available: http://www.thewest.com.au. [Accessed Sept. 18, 2007].

Internet Documents

Professional Internet Site


[1] European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB):
Implementation guide for DVB terrestrial services; transmission aspects,” European
Telecommunications Standards Institute, ETSI-TR-101, 2007. [Online]. Available:
http://www.etsi.org. [Accessed: Nov. 12, 2007].

General Internet Site


[2] J. Geralds, “Sega Ends Production of Dreamcast,” vnunet.com, para. 2, Jan. 31, 2007.
[Online]. Available: http://nli.vnunet.com/news/1116995. [Accessed Sept. 12, 2007].

Print Documents Books


Books

[4] R. Hayes, G. Pisano, and S. Wheelwright, Operations, Strategy, and Technical Knowledge.
Hoboken, NJ: Wiley, 2007
Page Dimensions and Margin
The dimensions of the Spiral binding report should be Standard A4 size (297mm x 210mm)
paper, may be used for preparing the copies. The report should have the following page margins:
Top and Bottom edge : 25 mm (1 inch) Left and right side : 25 mm (1 inch)

Page Numbering
All pages numbers should be typed at the center of page bottom. The preliminary pages of the
Project (such as Title page, Table of Contents, List of tables and figures, Notations,
Abbreviations etc.) should be numbered in lower case Roman numerals.

Page Type:

The project report should print on white paper with Spiral binding.
Size of Report

The size of Project report should not exceed 80 Pages of typed matter reckoned from the First
page of Chapter 1 to the last page.

Sequence of Report:

1. Cover Page
2. Progress Report form
3. Synopsis(2-3 Pages)
4. Table of Contents along with page numbers
5. List of Tables
6. List of Figures
7. List of Symbols, Abbreviations
8. Chapter 1: Introduction
9. Chapter 2: Hardware and Software Requirement
10. Chapter 3: SDLC Methodologies
11.Chapter 4: Software Requirement Specification and Analysis
12. Chapter 5: Risk Assessment
13.Chapter 6: DFD /ER Diagram/ wireframe/Application Architecture
14.Chapter 7: Project Modules Design/ Database tables/ Software Features
15.Chapter 8: Project Snapshots
16. References
Chapter 1: Introduction : This chapter cover the Introduction of the Project,
objective, motivation, Problem definition etc. chapter 2 of PPR-1(back ground
and related work) will be now sub chapter of Introduction. ( minimum 8-12
Pages)
Chapter 2: Hardware and Software Requirement : Write down in brief about
the Hardware and Software requirements of your project. (Minimum 1-2 Pages).
Chapter 3: SDLC Methodologies: Students should write the various popular
SDLC methodology in brief and in details explain the methodology used in project
and how it works in your project. (Minimum 3-4 Pages).
Chapter 4: Software Requirement Specification and Analysis: Write Down the
complete specification and description of requirements of software that needs to be
fulfilled for successful development of software system. These requirements can be
functional, interface requirements, performance requirement, design constraint, as
well as non-functional as Security, Portability, Reliability, Reusability, Application
compatibility, Data integrity, Scalability capacity, etc. depending upon type of
requirement.
Chapter 5: Risk Assessment: Write down about risk ought to be rated to the
chance of a risk coming back and the consequence of the issues related to that risk.
Risks plans should be created to contain the foremost damaging and also the
possible risks. Also write setup of risk containment like avoid risk, transfer risk,
risk reduction.

Chapter 6 : DFD /ER Diagram/ wireframe/Application Architecture: Students


should explain their Project DFD/ER Diagram/Application architecture ( As per
needed in Project) in details with various levels of DFD and ER diagrams are using
in Project. (Minimum 3-4 Pages).
Chapter 7: Project Modules Design/ Database Tables/ Software Features
Write down the design of the modules, Data base tables or software features of the
software.
Chapter 8: Project Snapshots: Add completed project modules
snapshot/result/Analysis of your project .
Sample Format is attached:
End Semester Project Progress Report
on
Title of Project
Submitted in partial fulfillment for award of
BACHELOR OF TECHNOLOGY
Degree
in
COMPUTER SCIENCE & ENGINEERING

2024-25
Under the Guidance of: Submitted By:

Name of Supervisor Name ( Univ. Roll No.)


Designation Name ( Univ. Roll No.)

Department of Computer Science & Engineering


MANGALMAY INSTITUTE OF ENGINEERING & TECHNOLOGY
Greater Noida

Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow


December 2024
Department of Computer Science & Engineering

Project Progress Report

1. Course : Bachelor of Technology


2. Semester : VII
3. Branch : Computer Science & Engineering
4. Project Title :
5. Details of Students:
S. No. Roll No. Name Role as Signature
1 Team Leader
2 Designer
3 Coder, Tester
4 Report

6. SUPERVISOR:

(Name of Supervisor)

Remarks from Project Supervisor:

…………………………………………………………………………………

……………………………………………………………………………………

…………………………………………………………………………………

 Note: Role can be Team Leader, Requirement Analyzer, Designer, Coder, Tester, Report
Preparation, Manual Preparation etc. Choose selective role in your Project as per team
member contribution.
SYNOPSIS
TABLE OF CONTENTS

Chapter No. Title Page No.

SYNOPSIS iii
LIST OF TABLES ix
LIST OF FIGURES x

1. INTRODUCTION 1

1.1 OVERVIEW OF THE STEGANOGRAPHY PROCESS 4


1.1.1 DIFFERENT TYPES OF STEGANOGRAPHY 5
1.1.2 USES OF STEGANOGRAPHY 7
1.1.3 STEGANOGRAPHY AND ENCRYPTION 9
1.1.4 LIMITATION 10
1.1.5 METHODS OF DIGITAL STEGANOGRAPHY 11
1.1.5.1 IMAGES AS CARRIERS 12
1.1.5.2 AUDIO FILE CARRIERS 12
1.2 MOTIVATION 13

2. BACKGROUND AND RELATED WORK 14

2.1 TECHNIQUES FOR DATA HIDING 14


2.1.1 DATA HIDING IN STILL IMAGE 19
2.1.2 DATA HIDING IN AUDIO 21
2.1.3 PHASAE CODING 26
2.1.4 SPREAD SPECTRUM 26
2.1.5 ECHO DATA HIDING 27
2.2 AUDIO STEGANOGRAPHY 28
2.2.1 LSB BASED AUDI STEGANOGRAPHY 30
2.2.2 DATA HIDING USING BIT MODIFICATION 35
2.2.3 DATA HIDING BY TONE INSERTION 37
2.2.4 PHASE CODING 39
LIST OF TABLES

Chapter No. Table No. Title Page No.

2 Table 2.1 Audio Stream with Encoded 32


4 Table 4.1 Guitar.wav 68
4 Table 4.2 Jhankar.wav 69
4 Table 4.3 Mohabatten.wav 70
4 Table 4.4 Pahalanasha.wav 70
4 Table 4.5 Mean Opinion Score MOS 72
LIST OF FIGURES

Chapter No. Figure No. Title Page No.

1 Figure 1.1 Categories of Steganography 6


2 Figure 2.1 Microsoft RIFF File Format 23
2 Figure 2.2 Encoding Message HEY in 16 bit CD Quality
Audio steganography at LSB 31
2 Figure 2.3 Sampling of the size wave followed by
Quantization Process 32
2 Figure 2.4 Hiding 1 bit of image in 16 bit quantized audio
sample 33
2 Figure 2.5 Hiding 4 bit of Image in 16 bit Quantized audio
signal 33
2 Figure 2.6 Illustrated the original signal and encoded signal
of phase coding Technique. 39
CHAPTER 1

INTRODUCTION

Since the rise of the Internet, one of the most important factors of information
technology and communication has been the security of information. Cryptography was created
as a technique for securing the secrecy of communication and many different methods have been
developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is
sometimes not enough to keep the contents of a message secret, it may also be necessary to keep
the existence of the message secret. The technique used to implement this, is called
Steganography.
Steganography is the art and science of invisible communication. This is
accomplished through hiding information in other information, thus hiding the existence of the
communicated information. The word steganography is derived from the Greek words “stegos”
meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. In image
steganography the information is hidden exclusively in images. The idea and practice of hiding
information has a long history. In Histories the Greek historian Herodotus writes of a nobleman,
Histaeus, who needed to communicate with his son-in-law in Greece.
well-known channels greatly reduces the risk of information being leaked in transit. Hiding
information in a photograph of the company picnic is less suspicious than communicating an
encrypted file.

1.1 OVERVIEW OF THE STEGANOGRAPHY PROCESS

Although steganography is an ancient subject, the modern formulation of it is often


given in terms of the prisoner’s problem proposed by Simmons, where two inmates wish to
communicate in secret to hatch an escape plan. All of their communication passes through a
warden who will throw them in solitary confinement should she suspect any covert
communication.
Steganography

Text Images Audio/ Video Protocol

Fig 1.1 Categories of Steganography

You might also like