Resources

This resources section will be used to provide access to content and files relating to this project, including: documentation, sample videos, etc...

Files

Description Stage 15 February 2013 20:31

This is a short report that is completed at the very beginning of the project. The report sets the scene for the project, discussing any relevant background material and identifying some of the problems and processes involved in undertaking the project. This document is brief and is used to assess whether the project is viable.


 
Understanding the Advanced Encryption Standard 17 February 2013 16:55

The Advanced Encryption Standard (AES) was specified over a decade ago, yet it remains the current de facto encryption algorithm for securing sensitive information. This document explains the maths and workings behind algorithm.


 
Survey and Analysis 28 March 2013 08:34

A prelimionary report that outlines that aims and current progress on the project thus far. A large portion of the report details a literature survey that evaluates existing research in the field.


 
Poster 08 May 2013 19:58

This is the poster that I presented at the poster session, where I demonstrated my project to students, academics and members of the Industrial Liaison Board.

At this session I was awared:

  • IBM Award for Best Third Year Project 2013
  • Prize for Best Video Based on Third Year Project.

 
Video Coding Fundamentals 28 July 2013 10:20

This document discusses some of the fundamental video coding principles that are relevant to the H.264 standard.


 
Final Report 29 July 2013 07:51

The field of digital steganography centres on hiding information in digital file formats. Whilst the application of steganographic techniques in relation to image and audio files has been extensively researched, research into the use of other container files remains limited.

The aim of this project is to explore different methods for securely encoding messages in a multimedia container, utilising both the audio and video stream, and using steganalysis to determine their effectiveness.