%PDF-1.7
%
1 0 obj
<>stream
application/pdfInformation Security Through Image Processing by Utilizing SteganographyGaurav Gupta , Shruti Patil , Piyush Varma , Ankita Raikwade, Yogita Sawant
A-PDF Watermark 4.7.6 ; modified using iTextSharp 4.1.6 by 1T3XTijert
endstream
endobj
2 0 obj
<>/Lang(en-IN)/Pages 3 0 R/StructTreeRoot 4 0 R/Metadata 1 0 R/Type/Catalog>>
endobj
3 0 obj
<>
endobj
5 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Contents[28 0 R 29 0 R 30 0 R 31 0 R 32 0 R 33 0 R 34 0 R 35 0 R 36 0 R 37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R 48 0 R 49 0 R 50 0 R 51 0 R 52 0 R 53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R 60 0 R 61 0 R]/Group<>/Annots[62 0 R 63 0 R 64 0 R]/Type/Page/Tabs/S>>
endobj
39 0 obj
<>stream
x]ms6*~0 e+9ˋo\*zXʊ_w$(M,rw{E h4n48W'.x_&ܝjdE7ߞ>LQ
&qKq>_'_>} 'X5
D J22N/Λ,8?@9|_owgWJ.ʦZ]pRou\%`>}:OK\Ea^QL2Yn/&6IPn.WjqYWv*frӉG(pqVA](odt;*~j-k=8< #1IS}y}q;{^*FLlC,L -9{DO8"z2DHQ
ߛZ7{T3REC:PRġcd
R8C7gl*^_ɻ\PU2Xxu4kg;|PU~==z6t(`4Hutose7!@m+c0!M`
JoP53ٝ%L,I`E.m&T,Cq"z_BuJ*Y͗{4>\zәxa
<f
a gouaʼzbҔ0Vc4l&^"8EyIf91`gUd%,vri`i$Xʥ ZɭKG9Nx\yF5E{(4Mdžx燎>'qoZCY
0Or+L4pmp/<ǰp&B!711R,Gh:Y3qQԃ,A~'PA"껛NE?KZcd0ecâ-;*C9_Ue'zd~&h0Qܝr& PG{k8Bp8k!&F"&NǍD@tLx{&o8hϢkOgh"G쬊r} a\q WEY~% yܾ-cdð|
햫E= nLN
*%[>ck&7)~yo=&&(0Lj:3m{SҐ}aӸ\C]i@e9n=)LyĜ㻃ǮKD&cé$bB/¶u32cx?K /Dl_>$նH{~3]39qiB""BlKJL1'3y/$1%}AN,eDNuXO/?Ъo%z)e`#yھZ=2Wq__'̦Z BE4pPxt/(QbQ6X^a;3oXmZv؈*ōi&'}v٣sTF_[kvCUq8Tɰޞ6 ,LqNF[/TzTBtb݁/Sn Vg:ARH"D8Uy|)Yq`42U%ۋjWKO~SUm`ц)S
6kܖĤyKDa$0wIXw$M 7Wfƅ34T,ՍVxf3VSU%ql\TKmhxZ3fĸKuI"P+*x/0`U%y$%@&Bm纡566r{Q3iI%!n]/PQP*=6
ӕV0ާ'4Hy82j'mډ'=#(A#,SY{ \:?,*$NZ[V*7&qgFMm*?!̷~_[zocluSBBjkp>+c}Q_LIRL!wZ,Kg!`kk;+L,3ABWETVSl1O.;F~vx;CӱND"qZ)
MF8
⸋bYXܙQDt{1kb\β0꒢Uİ%QT`R6YǢ-TuKխ6Ҭ~t0'=l`Mq203W̱D$8q4Xnwi fq>Ɨ+rZT$r#~٠ nf =pza@ڳW2;*PX/9XK_bD/cf% KBDv&;4?d$$:B'ŰH_ ~B!XUWl
q_t:#L1a?k0 w{Qݽcgbف&@=Hvbth`.=H[УR'`b+gԟje
nC.XvFR
d&)/PGczxd*kthQHۭ!t7poUPS݊I䨂(+-u84H