Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
WANT CODING just visit----------http://bit.ly/image_javaproject
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
WANT CODING just visit----------http://bit.ly/image_javaproject
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points.
Automatic gender and age classification has become quite relevant in the rise of social media platforms. However, the existing methods have not been completely successful in achieving this. Through this project, an attempt has been made to determine the gender and age based on a frame of the person. This is done by using deep learning, OpenCV which is capable of processing the real-time frames. This frame is given as input and the predicted gender and age are given as output. It is difficult to predict the exact age of a person using one frame due the facial expressions, lighting, makeup and so on so for this purpose various age ranges are taken, and the predicted age falls in one of them. The Adience dataset is used as it is a benchmark for face photos and includes various real-world imaging conditions like noise, lighting etc.
This is a web oriented application allows us to access the whole information about the college, staffs, students, facilities etc. This application provides a virtual tour of Campus. Here we will get the latest information about the students and staffs. This generic application designed for assisting the students of an institute regarding the information on the courses, subjects, classes, assignments, grades and timetable. It also provides the support that a faculty can also check about his daily schedule, can upload assignments, and notices to the students. Here administrator will manage the accounts of the student and faculties, makes the timetable, and upload the latest information about the campus.
Automated attendance system based on facial recognitionDhanush Kasargod
A MATLAB based system to take attendance in a classroom automatically using a camera. This project was carried out as a final year project in our Electronics and Communications Engineering course. The entire MATLAB code I've uploaded it in mathworks.com. Also the entire report will be available at academia.edu page. Will be delighted to hear from you.
It is the PDF file for the final year project report. It is very Good for the student who wants to prepare the final year report. This pdf file helps student alot. in the direction of making a project report
Resume and CV Summarization using NLP Reportsneha indulkar
This project proposes a model of extracting important information from the semi-structured
text format in a curriculum vitae or resume and ranking it according to the preference of the
associated company and requirements. In order to achieve the desired goal, the entire process has
been divided into 3 basic segments. The first segment consists of segmenting the entire CV /
Resume based on the topic of each part, the second segment consists of extracting data in
structured form from the unstructured data and the final segment consists of evaluating the
structured data by decision tree algorithm and training the system. The structured data extraction
process is done by segmenting the entire CV / Resume by converting it to text. After the
conversion to structured data, decision tree algorithm techniques are used to classify the input into
different categories based on qualifications, experience, etc.
E- Healthcare is a web based project system which deals with online checkup through video conferencing & doctor gives online prescription.
People can book appointments online by approaching the website of E- healthcare. And people can also download their lab reports. people can discuss their health related issues via video conferencing and get doctor useful prescription.
The main motive of introducing these “E - HEALTHCARE” system is to promote online health care services. Because lack of specialists is major problem in small towns. But E-healthcare provides online services like online treatment. It will be beneficial for all those peoples located in Small towns and the patients who have to take regular treatment, travel a lot where there is a lack of medical facilities.
Automatic gender and age classification has become quite relevant in the rise of social media platforms. However, the existing methods have not been completely successful in achieving this. Through this project, an attempt has been made to determine the gender and age based on a frame of the person. This is done by using deep learning, OpenCV which is capable of processing the real-time frames. This frame is given as input and the predicted gender and age are given as output. It is difficult to predict the exact age of a person using one frame due the facial expressions, lighting, makeup and so on so for this purpose various age ranges are taken, and the predicted age falls in one of them. The Adience dataset is used as it is a benchmark for face photos and includes various real-world imaging conditions like noise, lighting etc.
This is a web oriented application allows us to access the whole information about the college, staffs, students, facilities etc. This application provides a virtual tour of Campus. Here we will get the latest information about the students and staffs. This generic application designed for assisting the students of an institute regarding the information on the courses, subjects, classes, assignments, grades and timetable. It also provides the support that a faculty can also check about his daily schedule, can upload assignments, and notices to the students. Here administrator will manage the accounts of the student and faculties, makes the timetable, and upload the latest information about the campus.
Automated attendance system based on facial recognitionDhanush Kasargod
A MATLAB based system to take attendance in a classroom automatically using a camera. This project was carried out as a final year project in our Electronics and Communications Engineering course. The entire MATLAB code I've uploaded it in mathworks.com. Also the entire report will be available at academia.edu page. Will be delighted to hear from you.
It is the PDF file for the final year project report. It is very Good for the student who wants to prepare the final year report. This pdf file helps student alot. in the direction of making a project report
Resume and CV Summarization using NLP Reportsneha indulkar
This project proposes a model of extracting important information from the semi-structured
text format in a curriculum vitae or resume and ranking it according to the preference of the
associated company and requirements. In order to achieve the desired goal, the entire process has
been divided into 3 basic segments. The first segment consists of segmenting the entire CV /
Resume based on the topic of each part, the second segment consists of extracting data in
structured form from the unstructured data and the final segment consists of evaluating the
structured data by decision tree algorithm and training the system. The structured data extraction
process is done by segmenting the entire CV / Resume by converting it to text. After the
conversion to structured data, decision tree algorithm techniques are used to classify the input into
different categories based on qualifications, experience, etc.
E- Healthcare is a web based project system which deals with online checkup through video conferencing & doctor gives online prescription.
People can book appointments online by approaching the website of E- healthcare. And people can also download their lab reports. people can discuss their health related issues via video conferencing and get doctor useful prescription.
The main motive of introducing these “E - HEALTHCARE” system is to promote online health care services. Because lack of specialists is major problem in small towns. But E-healthcare provides online services like online treatment. It will be beneficial for all those peoples located in Small towns and the patients who have to take regular treatment, travel a lot where there is a lack of medical facilities.
Digital Watermarking describes methods and technologies that hide information, for example a number or text, in digital media, such as images, video. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. The hiding process has to be such that the modifications of the media are imperceptible. For images this means that the modifications of the pixel values have to be invisible.
A digital watermark is a message which is embedded into digital content (video, images or text) that can be detected or extracted later. Moreover, in image the actual bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. Watermarking is the insertion of imperceptible and inseparable information into the host data for data security & integrity. They are characterizing patterns, of varying visibility, added to the presentation media as a guarantee of authenticity, quality, ownership, and source. However, in digital watermarking, the message is supposed not to visible (or at least not interfering with the user experience of the content), but (only) electronic devices can retrieve the embedded message to identify the code. Another form of digital watermarking is known as steganography, in which a message is hidden in the content without typical citizens or the public authorities noticing its presence. Only a limited number of recipients can retrieve and decode the hidden message. Unlike a traditional watermark on paper, which is generally visible to the eye, digital watermarks can be made invisible or inaudible. They can, however, be read by a computer with the proper decoding software.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Data Security Using Audio SteganographyRajan Yadav
Steganography is the art and science of writing hidden messages in such a way that no
one, apart from the sender and intended recipient, suspects the existence of the message,
a form of security through obscurity. Steganography works by replacing bits of useless or
unused data in regular computer files (such as graphics, sound, text, HTML, or even
floppy disks ) with bits of different, invisible information. This hidden information can
be plain text, cipher text, or even images.
In a computer-based audio Steganography system, secret messages are embedded in
digital sound. The secret message is embedded by slightly altering the binary sequence of
a sound file. Existing audio Steganography software can embed messages in WAV, AU,
and even MP3 sound files. Embedding secret messages in digital sound is usually a more
difficult process than embedding messages in other media, such as digital images. These
methods range from rather simple algorithms that insert information in the form of signal
noise to more powerful methods that exploit sophisticated signal processing techniques
to hide information.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
Using passwords only has rapidly become a security risk. Another approach to security is visual
cryptography (VC), which divides paper documents into several encrypted papers managed by multiple
people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our
work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we
propose a method for automatically recognizing encrypted portions using images captured by a digital
device's camera. Our system has several advantages, including no actual text in communication and
enabling users to use different passwords or secret questions at each use. Furthermore, our method is
implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at
encrypted portions. We conducted experiments regarding recognition accuracy and performance and
obtained results showing that our proposed method was able to achieve a high recognition rate at a low
cost.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
Using passwords only has rapidly become a security risk. Another approach to security is visual cryptography (VC), which divides paper documents into several encrypted papers managed by multiple people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we propose a method for automatically recognizing encrypted portions using images captured by a digital device's camera. Our system has several advantages, including no actual text in communication and enabling users to use different passwords or secret questions at each use. Furthermore, our method is implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at encrypted portions. We conducted experiments regarding recognition accuracy and performance and obtained results showing that our proposed method was able to achieve a high recognition rate at a low cost.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Image encryption using jumbling saltingMauryasuraj98
In this project we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider.
For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
CONCLUSION
This proposal of monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, this inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks.
Similar to Extended Visual Cryptography Using Watermarking (20)
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
1. EXTENDED VISUAL CRYPTOGRAPHY USING WATERMARKING
TECHNIQUE
Enrollment No. - 9911103553
Name of Student - Shivam Singh
Name of Supervisor - Mr. Raju Pal
June -2015
Submitted in partial fulfillment of the Degree of
Bachelor of Technology
In
Computer Science Engineering
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING &
INFORMATION TECHNOLOGY
JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY, NOIDA
2. TABLE OF CONTENTS
Chapter No. Topics Page No.
Acknowledgement I
Summary II
List of Tables
List of Figures Iv
List of Symbols and Acronyms V
Chapter-1 Introduction
1.1 General Introduction 1
1.2 Problem Statement 1
1.3 Empirical Study 2
1.4 Approach to problem in terms of technology 2
Chapter-2 Literature Survey
2.1 Summary of papers studied
2.2 Integrated Summary
2.3 Integrated Summary of the literature studied
2.4 Empirical Study
3-6
7
5
6-9
Chapter-3 Analysis, Design and Modeling
3.1 Overall Description Of the Project 8
3.2 Functional Requirements 8
3.3 Non Functional requirements
dependency details
9
3.4 Design Diagrams 9
Chapter-4 Implementation details and issues
4.1.1 Implementation issues 10
4.1.2 Algorithms 11
4.2 Risk Analysis Mitigation 13-15
3. Chapter-5 Testing
5.1 Testing Plan 16
5.2 Component Decomposition and type of Testing
Required
18
5.3 List all test cases 18
5.4 Limitations of the solution 18
Chapter-6 Findings & Conclusion
6.1 Findings 19
6.2 Conclusion 19
6.3 Future Work 19
Appendix A. Gantt Chart
B. References
C. Snapshots
D. CV
20
20
21-24
25-26
4. (II)
DECLARATION
I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it
contains no material previously published or written by another person nor material which has been
accepted for the award of any other degree or diploma of the university or other institute of higher
learning, except where due acknowledgment has been made in the text.
Place: Noida Signature :
Date: 4/06/2015 Name : Shivam Singh
Enrollment No. : 9911103553
5. (III)
CERTIFICATE
This is to certify that the work titled “EXTENDED VISUAL CRYPTOGRAPHY USING
WATERMARKING” submitted by “Shivam Singh” in partial fulfillment for the award of degree of
B. Tech. of Jaypee Institute of Information Technology, Noida has been carried out under my
supervision. This work has not been submitted partially or wholly to any other University or Institute
for the award of this or any other degree or diploma.
Signature of Supervisor:
Name of Supervisor : Mr. Raju Pal
Designation : Assistant Professor
Date : 4-06-2013
6. (IV)
ACKNOWLEDGEMENT
The completion of any project work depends upon the cooperation, coordination and combined
effects of several resources of knowledge, energy and time. Therefore we approach this important
matter of acknowledgement through these lines trying our best to give full credits where it
deserves.
I am extremely grateful to my supervisor Mr. Raju Pal for his expert guidance, constant
encouragement, valuable suggestions, constructive criticism and sustained interest in the project that
tremendously enhanced our perseverance towards our major project work.
Name of Student : Shivam Singh
Enrollment Number : 9911103553
Date : 3 May 2015
7. (V)
SUMMARY
Digital watermarking is a technique that provides a solution to the longstanding problems faced with
copyrighting digital data. Often attackers are only interested in a small subsection of the image. A
watermark at the edge of an image can often easily be cropped out of the picture without any
significant loss. The only defense against this attack is to tile a very small watermark all over the
image, and allow retrieval of the watermark from any of the small subsections of the fragmented image.
Further with a robust encryption and decryption technique we can have a proper security altogether.
Signature of Student: Signature of Supervisor:
Name : Name
Date : Date
8. (VI)
LIST OF TABLES
Table No. Description Page Number
Table 1 Integrated Summary 7
Table 2 Risk Analysis 14
Table 3 Impact 14
Table 4 Mitigation Plan 15
Table 5 Test Plan 17
Table 6 Test Schedule 17
Table 7 Testing Components 18
Table 8 Test cases 18
10. (VIII)
List of Symbols and Acronyms
Acronym Meaning
HTML Hyper Text Markup Language
EVCS Extended Visual Cryptography Scheme
LSB Least Significant Bit
AES Advance Encryption Standard
11.
12. Chapter 1: Introduction
1.1 General Introduction-
First and foremost, Naor and Shamir suggested an encryption scheme that was able to encrypt an
images they call it Visual Cryptography scheme. VCS is a type of cryptography in which images can be
encrypted in a secure way by dividing them in a distorted image called transparent shares and
transmitted physically by printing these shares on transparency sheets to the intended user. The
essential intention behind this plan was to encode a mystery picture and send over uncertain medium to
the objective client to share it. The magnificence of this plan is that the offer produced by this plan does
not uncover any data about the first picture and the quantity of shares created in this plan guarantees the
security of the substance held in the offer. This makes VCS plan a totally secure plan. VCS is a vital
plan and it is material in a wide mixture of uses where it can be utilized. Case in point it can be utilized
by any individual who has no data about cryptography can utilize it effortlessly. Many types of visual
cryptography are used nowadays, the very first type of traditional visual cryptography right up to the
latest developments. Traditional VC specifically deals with sharing a single binary secret between a
numbers of participants. Extended VC attempts to take this a step further by introducing shares that
have significant visual meaning. This detracts from the suspicious looking encrypted shares that are
generated using traditional methods. Dynamic, colour, progressive and image hatching VC schemes are
also taken into consideration for latest developments in this field.
1.2 Problem Statement-
Due to rapid growth in computer technology and multimedia network techniques the digital media is
now prone to attacks in one way or another. However, there are some areas where the data can be
exploited in a negative way, which create a pressing need for copyright enforcement methods that can
protect copyright ownership. VCS cheating prevention is one of such methods that have been
developed to protect intellectual property of image in digital form. It is realized by embedding the
copyright information, also known as "the watermark pattern", into the original image. The watermark
pattern in the cover image can be either visible or invisible. But even after providing a secure medium
the watermarking is not exclusively used for sharing important information which is the problem
statement for the course of this project.
13. 1.3 Empirical Study-
Digital watermarking is a method that provides a better solution to the problems faced with digital data
copyrighting. Often hackers are only interested in a small portion of the image. A watermark at the
corners of an image can often easily be exploited by polluting or cropping out the picture without any
significant loss. The mosaic attack is a perfect example of this method. In a mosaic attack, the attacker
exploits the entire watermarked image by breaking it into many small parts. The only defense against
this attack is to place over a very small watermark all over the image, and allow them to get the
watermark from any of the small subsections of the fragmented image. With a robust encryption and
decryption technique we can have a proper security altogether. Further this will provide a much more
secure way to share information through watermarking.
1.4 Approach to problem in terms of technology
The different approach of watermarking, encryption and decryption are solved using java. Different
modules of the requirements were made using java applet and were depicted in a combined form.
Further as the key entered at the time of encryption needs a check at the time of decryption so it is
managed my MySQL database server using SQLyog. Further for the project to be secure there is a
login created in starting. Finally we easily save the decrypted file for our use.
Chapter 2: Literature Survey
2.1 Summary of papers studied
14. 2.1.1 Visual Cryptography-(Base paper)
Authors-Moni Naor and Adi Shamir
Publishing details -Lecture Notes in Computer Science Volume 950, pp. 1-12.
Year-1995
Summary-
The paper gives insight on the problem of encrypting written material in a perfectly secure way
which can be decoded directly by the human visual system. The basic model consists of two parts
namely a printed page of ciphertext (information that is shared) and a printed transparency (secret
key). The original cleartext is obtained by placing the transparency by placing the key over the page
having ciphertext; moreover each one of them is indistinguishable from random noise. Due to its
simplicity, the system can be used by anyone without any knowledge of cryptography and without
performing any cryptographic computations.
Given a written message, it was required to generate n transparencies so that if any k (or more) of
them are stacked together then the original message is visible, but becomes totally invisible if less
than k transparencies are stacked together. The original encryption problem can be considered as a
2 out of 2 secret sharing problem. The main results of this paper include practical implementations
of a k out of n visual secret sharing scheme for small values of k and n, as well as efficient
constructions which can be proven optimal within certain classes of schemes.
Weblink-
https://scholar.google.co.in/scholar?q=Visual+Cryptography&hl=en&as_sdt=0&as_vis=1&oi=scho
lart&sa=X&ei=JmYnVfvGJIKZuQS934GAAQ&ved=0CBoQgQMwA
2.1.2 A Visual Cryptography Based Digital Image Copyright Protection
Authors- Adel Hammad Abusitta
Publishing details - Journal of Information Security, 2013, 3, 96-104
Year- 2013
15. Summary-
The proposed method works on the selecting random pixels from the original digital image instead
of specific selection of pixels. The method proposes that the embedding of watermark pattern to the
original image is not an urgent requirement for security. Instead of that, the verification information
is obtained which will be used to verify the authentication of the image from the owner. This results
that the marked image is equal to the original image. This technique is based on the relationship
between 8-neighbors‟ pixels and the randomly selected pixels. This relationship helped the marked
image to withstand against the various attacks; even the most significant bit of randomly selected
pixels have been as mentioned in this paper. Verification information is generated which will be
used to verify the ownership of the image. This leaves the marked image equal to the original
image. The proposed method is tested and shows that a watermark pattern can be retrieved easily
from marked image even the image is attacked by major changes in pixels bits.
Weblink-http://www.scirp.org/journal/PaperInformation.aspx?PaperID=18788#.VSdn5PmUe-0
2.1.3 An Extended Visual Cryptography Scheme without pixel expansion for halftone images
Authors-N. Askari, H.M. Heys, and C.R. Moloney
Publishing Details- IEEE Canadian Conference on Electrical and Computer Engineering
(CCECE), Montreal, pp. 1-4, 2014.
Year - 2014
. Summary-
In this paper, a technique is proposed for processing halftone images that enhances the quality of
the share images and the secret image which is recovered in an extended visual cryptography
scheme for which the size of the recovered image and share images is same as the original halftone
secret image. This method gives a result which helps in maintaining the security of the extended
visual cryptography in a robust way. The drawback in such an approach is a decline in image
quality. The application of the preprocessing schemes is to construct extended visual cryptography
scheme without image size expansion. For its implementation three halftone images were selected
to act as input. The first two images contain some relevant cover images and the third image is the
16. secret image. The block replacement algorithms convert the three input images into some processed
images. A processed image contains two blocks namely white and black which can be used as an
input secret image in any encoding process of visual cryptography. After producing the three
processed images by the valid method, the two shares are generated according to the encoding
process of EVC. The secret image is obtained by placing the two shares in a stack together. In order
to check the validity of the proposed scheme a visual experiment was also conducted. Further it was
shown that using an intelligent pre-processing of halftone images based on the characteristics of the
original secret image it was able to produce good quality images in the shares and the recovered
image.
Weblink-
https://scholar.google.co.in/scholar?q=An+Extended+Visual+Cryptography+Scheme+without+pixe
l+expansion+for+halftone+images&hl=en&as_sdt=0&as_vis=1&oi=scholart&sa=X&ei=F2knVbD
BKIq9uAT-2YGYBg&ved=0CBsQgQMwAA
2.1.4 Multiuser Watermarking using Visual Cryptography
Authors- Komal Toshniwal M.E.Student, D.Y.Patil, Pimpri, Pune
Publishing Details- International Journal of Innovations in Engineering and Technology
(IJIET), Vol. 2 Issue 1 February 2013
Year- 2013
Summary-
In this paper a Visual Cryptography based watermarking scheme is proposed which is more secure
and robust than the schemes mentioned in the above research papers. Furthermore, the proposed
scheme can deal with multiple owners as well as multiple cover images. A qualitative comparison
17. on effectiveness between the proposed scheme and some known VC based watermarking schemes
were done and analyzed. The comparisons show a result that the proposed scheme has many special
properties. In this scheme, there is a use of the VCS with underlying operation XOR, because an
XOR-based VCS usually has better performance in terms of the visual quality of the recovered
secret image and the pixel expansion. For some attacks, the error pixels may be aggregated, for
example, the cropping attack. The torus automorphism can scatter the error pixels to the entire
image uniformly. Further with a robust embedding and extracting methods it leads to highly secure
way to watermark using visual cryptography. Lastly it was also mentioned that the proposed
scheme is carried forward to develop it for number of images of all the extensions.
Weblink-
https://scholar.google.co.in/scholar?q=Multiuser+Watermarking+using+Visual+Cryptography&hl=
en&as_sdt=0&as_vis=1&oi=scholart&sa=X&ei=oGknVc32E463uATknYKICQ&ved=0CB0QgQ
MwAA
18. 2.2 Integrated summary:
1. The problem of encrypting written material in a perfectly secure way which can be
decoded directly by the human eyes was solved by visual cryptography.
2. Extended visual cryptography came into existence which further helped in much
secure encryption technique
3. Selection of random pixels from the original digital image instead of specific selection
of pixels keeps the marked image coherent against diverse attacks even if the most
significant bits of randomly selected pixels have been changed by attacker.
4. Pre-processing of halftone images based on the characteristics of the original secret
image it was able to produce good quality images in the shares and the recovered
image
5. VC-based watermarking scheme is used which has strong robustness, perfect
imperceptibility, and satisfies the blindness and security properties
Table 1: Integrated Summary
19. Chapter 3: Analysis, Design and Modeling
3.1 Overall description of the project-
Basically we are making an effort to understand and implement the Watermarking as a technique to
protect the copyright of digital media such as image, text, music and movie. As proposed in the
research paper (2.1.4) we are trying to implement it with further advancements.
The model of this scheme includes three kinds of participants –
1) the owners of the cover images who want to protect their copyright of the cover images
2) the attackers who want to illegally use the cover images
3) A TA (Trusted Authority) who will arbitrate the ownership of the cover images when a dispute
occurs.
The proposed watermarking scheme contains two algorithms
1) The embedding algorithm
2) The extracting algorithm.
Basically we are using tiny algorithm for encryption and decryption and watermarking is itself used as
the secret data to be shared.
3.2 Functional requirements
Purpose: The purpose of the project is to watermark an important image to secure it and identify
authorize user in a dispute. The proposed approach uses AES algorithm, Error correcting technique
along with Visual cryptography to give robustness to the watermarked image
Input: The original image, watermarked image and the secret key are the input of the proposed
approach
Output: Several parameters are used to qualify the proposed technique, examining tests on the resulted
watermarked image.
20. 3.3 Non Functional requirements
All the forms and modules should allow maximum readability to the user.
Support reliability and maintainability
It can be extendible and more features can be added
It can be extended to process requests for web pages and distributed systems.
3.4 Design Diagrams
Data Flow Diagram-
Figure1: Data flow Diagram
Chapter 4: Implementation details and issues
21. 4.1 Implementation details and issues-
4.1.1 Implementation Issues-
Using Watermarking is itself a big process to handle and along with cryptography a lot of modules are
handled in a single interface. With the use of watermarking itself to share a required data through an
attack prone area is hard to achieve. Further with the use of java applet to depict the actual
implementation it requires a lot of time to build the whole model including every module to run
properly. Moreover some of the images after decryption showed some erroneous results which were a
cause of worry.
Alignment Problems-
Pixel development is an imperative parameter for Visual Cryptography Schemes (VCS). In any case,
most research in writing is devoted to decrease pixel extension to lessen number of subpixels that speak
to a pixel in unique mystery picture. It is truly insufficient since final size of the transparencies of the
VCS is influenced by number of the subpixels, as well as by size of the subpixels in the transparencies.
Then again, diminishing the span of the subpixels in transparencies is because of difficulties of the
transparencies arranged.
VCS Cheating Prevention-
The cheating problem in VCS is quite interesting. The possibility of cheating activity in VCS has been
studied. For cheating, the cheaters present some fake shares so that the stacking of fake and genuine
shares together reveals a fake image, and the victims who cannot detect the cheating activities will be
fooled to believe that the recovered fake image is the genuine secret image. This is terrible because the
secret image is usually important to the victims.
Flipping Issues in VCS-
Many schemes within visual cryptography suffer from alignment issues and are dependent on how the
shares are stacked together. Loosening or removing this restriction would be a very desirable advance,
as it enables an end user to recover the secret without having to work out how he must stack the shares.
Distortion Problems-
22. For visual cryptography plan (VCS), ordinarily, the extent of the recuperated mystery picture will be
extended by m (≥1) times of the first mystery picture. Much of the time m is not a square number;
henceforth the recuperated mystery picture will be bended. Infrequently, m is too vast that will convey
much impairment to the members to convey the offer picture
4.1.2 Algorithms-
Figure2 Embedding Algorithm (2.1.4)
Figure3 Extracting Algorithm (2.1.4)
23. Firstly the image is processed by watermarking and this watermarking depends on the domain in which
the watermarking is done – the frequency and spatial domain. Watermarking in the latter involves
selecting the pixels to be changed based on their location within the image and is prone to the mosaic
attack and cropping attack.
The LSB technique is the simplest watermark technique to perform insertion. Assuming that 3 bytes of
size is allocated for each pixel. Then, each of the colors contains 8 bits of information, in which the
intensity of that colour can be measured on a scale of 0 to 255.
So taking an example
X0 = (R=255, G=0, B=255)
Now with a slight change in pixel:
X1 = (R=255, G=0, B=254)
We have only changed value of B here. For the human eye, detecting a difference of 1 on a color scale
of 0- 256 is not possible in a practical way.
Now as each color is stored in a different byte, the very last bit in each byte stores this difference of
one. So the difference between values 255 and 254, or 127 and 126 is stored in the last bit, called the
Least Significant Bit (LSB).
Since this difference don‟t hamper much, so when we replace the color intensity information in the
LSB with watermarking information, the image will still look almost same to the naked eye.
Thus to depict the algorithm for this technique:
Let W be watermarking information
For every pixel in the image, Xi
Do Loop:
Store the next bit from W in the LSB position of Xi [red] byte
24. Store the next bit from W in the LSB position of Xi [green] byte
Store the next bit from W in the LSB position of Xi [blue] byte
End Loop
To extract watermark data all the data in the LSBs of the color bytes is taken and combined.
.
4.2 Risk Analysis and Mitigation
Risk
id
Classification Description of risk Risk area Probability
(P)
Impact(I) Re(P*I)
1 Hardware Incapability of hardware
like RAM, Processor,
Memory etc
Performance,
hardware,
Time
High high 8.1
2 Multi-tenancy
(Shared
access)
All the users are using
the same physical
architecture
Security Low low 0.1
3 Security Critical Data at risk Security High Medium 8.1
4 Security Authentication,
authorization, and access
control
User, Project
Scope, Time
High High 8.1
5 Hardware Processor can direct boot
from pen drive
Performance,
Time
Low High 0.9
6 Ownership User the owner of data Security High Low 0.9
7 Environment Windows and Netbeans
is necessary for
simulation
Performance,
Time
High Medium 8.1
8 Personnel
Related
Incompetent Skills Time High High 8.1
25. 9 Personnel
Related
Irregularity Time Medium High 2.7
Table2: Risk Analysis
Table3: Impact
Risk Mitigation Plan
Hardware Hardware related issues can be resolved by
using powerful processors support, Faster
RAMs and Bigger Storage device.
Security Secure connection must be established while
encryption and decryption
Personnel Related Placements Activities are unavoidable.
Projects related skills need time because no one
hasn‟t explored it yet completely. We will try
to avoid irregularity.
Environments Netbeans must be installed on windows
Table4: Mitigation Plan
RATING IMPACT PROBABILITY
HIGH 9 0.9
MEDIUM 3 0.3
LOW 1 0.1
26. Chapter-5: Testing
5.1 Testing Plan-
Type of Test Will Test
be
Performed
Comments/Explanation Component
Requirement Yes Requirements specification must contain
all the requirements that are to be solved
by our system.
Hardware and
working
Unit Yes Sets of one or more computer program
modules together with associated control
data, usage procedures, and operating
procedures are tested to determine if they
are fit for use.
Units of source
code, operating
procedures
Integration Yes takes as its input modules that have
been unit tested, groups them in larger
aggregates, applies tests defined in an
integration test plan to those aggregates,
and delivers as its output the integrated
system
individual
software modules
Performance Yes Redundancy and fail-over options should
be considered.
NA
Stress Yes Simulating beyond normal
Operational capacity.
Heavy data files.
Compliance Yes It determines, whether we are
implementing and meeting the defined
standards.
Need in testing
the performance
metric
27. Table 5: Test Plan
All possible test cases were prepared based on the system requirements and documentation. We sought
the help of some other persons who were involved in developing similar networking projects for their
final year projects.
5.1.1:-Test Schedule:
Sl. No Test Strategy Start Date End Date
1 Requirement 5th
March 2015 2nd
April 2015
2 Unit 20th
March 2015 2nd
May 2015
3 Integration 4th
April 2015 14th
April 2015
4 Performance 5th
May 2015 17th
May 2015
5 Stress 17th
May 2015 19th
May 2015
6 Compliance 19th
May 2015 24th
May 2015
Table 6: Test Schedule
5.2 Component decomposition and type of testing required-
S.No. Various components
that require testing
Type of testing
required
Technique for
writing Test cases
28. 1 Algorithms
Implemented
Unit, Performance,
Volume, Security
White box
2 Performance Metric
and results
Unit, Performance,
Stress
Black box
3 cryptographic tools
and results
Unit, Performance,
Integration
White box
Table 7: Testing Components
5.3 List all test cases
S.No. Input Output Status
1 Activate the Netbeans IDE
and execute the code for
watermarking
code executes
without error
Pass
2 Execute Encryption
algorithm
Desired outputs
accordingly
Pass
3 Execute Decryption
algorithm
Desired Outputs
accordingly
Pass
Table 8: Test Cases
5.4 Limitations of the solution
The proposed solution for the problem statement is limited to some extent. Firstly for the proposed
solution to give best results we took .jpg format images and we experienced some visual errors on some
images at the time of decryption. Further for watermarking we assumed some image dimension (300
x400) due to which images are resized before watermarking so reducing their original properties.
29. Chapter-6: Findings & Conclusion
6.1 Findings
After successful execution of project we found out that this technique can be used on several of
occasions where a user needs to secure his/her files from attack. Further if a user wants to send
particular information in form of codes this information can be watermarked and further be extracted
by the user who wants the information.
6.2 Conclusion
Cryptography is a vast topic which still needs a lot of development. Watermarking is an effective tool
to make a digital copyright of our own content from attack of outsiders but the watermark can itself be
used to send secret information across the channel. So firstly the watermarked image contains a coded
message itself which is encrypted with a key and now with this key the information can be received by
the user who needs it.
6.3 Future Work
Basically it is hard to maintain the originality of the input image totally which leads to distortion
problems. So a robust watermarking along with cryptography can be developed which can prevent the
image from being hacked as well as distorted. Mostly the file type presently being worked upon i.e.
.jpg format should be increased to a lot more (.gif, png). And last but not the least the encryption –
decryption techniques should be changed as per emergence of new technologies.
30. APPENDIX
A. Project plan as Gantt chart:
TASK
10-02-
2015
24-03-
2015
25-03-
2015
27-03-
2015
07-04-
2015
10-04-
2015
26-04-2015 3-06-2015
Topic
Discussion
with mentor -
Topic
Finalization
and
requirement
discussion
Initial proposal
collection of
Data-Set
Progress
reported to
mentor of till
date work
Mid Term
Evaluation
Work on
management
and final
implementation
Final
Evaluation
31. B. References
[1] N.Nikolaidis and LPitas “Copyright protection of images using robust digital signatures” proc.
Of ICASSP-96, Atlanta, USA, May 1996 (accepted).
[2] H. Koga, “A general formula of the (t,n)-threshold visual secret sharing scheme,” in Advances
in Cryptology, Asia crypt, pp. 328-345, 2002.
[3] Adhikari and S. Sikdar, “A new (2, n)-visual threshold scheme for color images,” in Proc.
INDOCRYPT 2003, Berlin, pp. 148-161, 2003
[4] Wang, F.H., Yen, K.K., Jain, L.C., Pan, J.S.: „Multiuser-based shadow watermark extraction
system‟, Inf. Sci., 2007, 177, pp. 2522–2532
[5] Lou, D.C., Tso, H.K., Liu, J.L.: „A copyright protection scheme for digital images using visual
cryptography technique‟, omput.Stand.Interfaces, 2007
[6] Wang, M.S., Chen, W.C.: „Digital image copyright protection scheme based onvisual
cryptography and singular value decomposition‟, Opt.Eng. 2007
36. D. CURRICULUM VITAE
SHIVAM SINGH
P-18, NEW MEDICAL ENCLAVE, B.H.U
VARANASI, UTTAR PRADESH
E-mail: shivamnhu9@gmail.com
Phone: 9811054360
Academic profile
Standard Board/School Marks Year
Std X CBSE , Sunbeam English School , Bhagwanpur, Varanasi,U.P. 87.8% 2008
Std XII CBSE , Sunbeam English School , Bhagwanpur, Varanasi,U.P. 75% 2010
Currently pursuing
Bachelor of Technology in Computer Science and Engineering from Jaypee Institute Of Information
Technology (JIIT), Noida.
Current CGPA after completion of 7th Semester: 5.1 out of 10.
Technical skills
Programming languages: C/C++,PHP,HTML
Database languages: SQL
Basic knowledge of Java programming
Friendly with Hybrid mobile application development.
Platforms: Windows and Linux
FIELD OF INTEREST
Mobile Application Development, Web Technology, Big Data Technology
SUMMER TRAINING
Project based summer training at CETPA INFOTECH.
Project: A JSP based web application on “Online Recruitment “.
37. PROJECTS
Build an home automation system to conserve electricity with help of 8051 in MPC
(Microprocessor and Controller) 4th
Semester.
Made a website that provides new way of college management system for minor project during 5th
Semester.
Made a website named “Feed Wave” for getting live search as well as display of latest news for minor
project during 6th
Semester.
Made a hybrid mobile application “Awsumz” for fetching news from different news websites using
RSS feeds as part of major project during 7th
semester.
EXTRA-CURRICULAR
Participated in web designing workshop(I-vision studio)
Participated in ethical hacking workshop(I3indya technologies)
Voluntary participation in Jaypee youth marathon
Actively participated in online coding competition
Vivid badminton, table tennis, cricket player at school level
.