SlideShare a Scribd company logo
1 of 5
Download to read offline
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1341
ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
Implementation of Image Steganography using LabVIEW
Shanthamma .K
GSSS Institute of Engineering and
Technology For Women, Mysuru,
Karnataka
meghashanthik97@gmail.com
Sanket N. Shettar
GSSS Institute of Engineering and
Technology For Women, Mysuru,
Karnataka
sanket@gsss.edu.in
Senthilkumar .S
Kaynes Technology, Mysuru,
Karnataka
ssenthil@kaynes.com
Abstract: Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Keywords: Steganography, Image Processing, LabVIEW, Virtual Instrumentations (VI), Data Hiding.
I. INTRODUCTION
Steganography is one of the most used techniques for secure communication. It is used for to hiding the secret messages within a
cover image to protect the data from the third person. To keep the message secret there are different methods to encrypt the data one
of these is cryptography. In cryptography, the security was done by encryption and decryption of massage. In case of steganography,
data information is hiding in cover information. Steganography overcomes the disadvantage of cryptography that the existence of
message is also not visible because in some communications it is not enough to encrypt the data. In this paper, Image steganography
is implemented [1]. Image steganography uses both data and covers information in image format. It hides the data information in a
cover media without making any visible changes in it and the data media existence is concealed. Steganography is mainly applied
to Text, Audio, Video, Image and also protocol.
II. SIGNIFICANCE OF STEGANOGRAPHY
The main importance of data hiding techniques comes from the fact the there is no reliability over the medium through which the
information is sending, in other words, the medium is not secured. So, that some important methods are implemented it becomes
very difficult for unintended user difficult to the unintended user to extract the data information from cover information [2]. Few
reasons behind data hiding are.
 Personal and private data
 Sensitive data
 Confidential data and trade secrets
 To avoid misuse of data
 Unintentional damage to data, human error and accidental deletion of data
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1342
 Monetary and blackmail purposes
 To hide traces of crime
III. IMAGE STEGANOGRAPHY
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.Many
different file formats are used like Text, Audio/Video, and Image for steganography but images are more frequently used because
of their frequency on the Internet. In image steganography, we see the different stenographic technique to hide secrete information
in an image like. Least significant bit, Pixel value differencing Edges based data embedding method, Random pixel embedding
method, mapping pixel to hidden data method, Labeling or connectivity method, Pixel intensity or gray level value based method,
Texture based method, Histogram based methods, Spread Spectrum based methods and Color Palette based methods [3].
Steganography is used for the hiding of data from the third person in secrete communication. Cryptography is also one of the
techniques to hide the data from an unauthorized user; here security was done by using encryption and decryption algorithm. In
steganography data image is hiding in the cover image to overcome the problem of cryptography that the existence of message is
also not visible because in some communications it is not enough to encrypt the data [4].It uses both data and covers information in
image format. It hides the data information in a cover media without making any visible changes in it and the data media existence
is concealed. Fig. 1 shows the four main categories of file formats that can be used for Steganography.
Fig 1: Categories of Steganography
IV. ENCODING
Encoding is the first process in steganography means encoding data image in the cover image. Data image is secreting message
which should be invisible to the third person. The hide data image is converting the image into pixels values in RGB format. The
data image, as well as cover image, is converted into three matrixes corresponding to Red, Green and Blue components. Data image
of the value of each pixel of the matrix has been searching for the corresponding cover image and store it has a global variable.
From encoding process, we obtained three global variables as corresponding to Red, Green and Blue format [5].So that these global
variables are key for decoding the image as shown in Fig.2.
Fig 2: Encoding Process
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1343
V. DECODING
Decoding is the reverse process of encoding here we recover the hidden image from the cover image. In the decoding process, we
obtained global variables called as secrete shared key.This key provides the array of Red, Green and Blue pixel values. Using these
arrays to search in whole image and result will give the data image. Fig 3 shows the decoding process [6].
Fig 3 Decoding Process
Here the shared secret key is a global variable which is obtained from the encoder. Final data image received is created from a cover
image according to the location stored in global variable [7].Data image should not be greater in size that covers image because in
between data image and cover image there should be some correlation so that location of data image can be stored in global variables
[8].
VI. PROCEDURE INVOLVED IN BOTH ENCODING AND DECODING PROCESS
For encoding first, we choose the cover image from file location in PC, Extract the pixels value of the cover image and then extract
the RGB value of each pixel value of the cover image. Reshape the 2D RGB array of the cover image into a 1D array. After we take
the data image through Vision acquisition. Extract the pixel value of data image and then reshape the 2D R, G, B array of data image
to 1D array. In the encoding process, we extract the column and row size of data image and send it to global variables. Search each
value of R, G, B of Data Image from the reshaped 1D R, G, B array of Cover Image and give its index value. Send this index value
of RGB to global variables [8].
In decoding, we take same cover image used in encoding VI.RGB values of each pixel are extracted from the cover image and after
it converts 2D RGB array of data image into a 1d array.Search the element of RGB of Data image from the Cover Image. Take the
global variable for searching which is same in encoding part.It is helpful to extract 2D RGB values of data Image. Combine the
RGB values and extract data image.
VII. IMPLEMENTATION AND RESULTS
Laboratory virtual instrumentation engineering workbench (LabVIEW) is a platform and development environment for a visual
programming language from National Instruments. It is very user friendly and easy software to program any system without very
deep knowledge of programming. The programming in LabVIEW is graphical programming, not a text based programming. Due
to graphical programming syntax is not used so it is very easy to understand for an
Engineer. In LabVIEW, we have seen two windows like Front panel and Block diagram window respectively [9]. In front panel
input and output are present. This window is accessible to users, another window which in the block diagram is responsible for
programming.
a) Block diagram for Encoder: Encoder is implemented using LabVIEW First takes the data image and cover images are
converted into a matrix of pixels values of R, G, B.pixel value of data image search in pixel values of cover image and
location is stored in global variables. This global variable is used as a key for the decoder. The upper part of the figure is
programming for extraction of the cover image and the lower part is for extraction of data image [10].
b) The front panel of Encoder: Here we take two inputs images, one is data image another one is the cover image. Both
images are selected once and run the program so that encoding is done and pixel values of the corresponding image will
be shown on the front panel. In the figure, upper image is data image and the lower image is the cover image.Here data
image is encoded in cover image and then the pixel value of data image and the cover image is also as shown in the front
panel [11].
c) Block diagram for Decoder: In the decoding process, we use the global variables as key for decoder obtained from
encoding VI to extract the data image from the cover image. Here the reverse process of encoding takes place.
d) The front panel of Decoder: In front panel of decoder we select the same cover image used in encoding. Process. Global
variables used as a key for decoding Process.From these global variables, we extract the data image in the cover image.
The encoded image is given as input and output is data image. So third person cannot track easily secrete information [12].
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1344
VIII. CONCLUSION
Steganography is one of the techniques used for secrete communication to protect the data from the third person. Here Steganography
is implemented for security purpose where the objective is to send massage image within a cover image. It would be helpful to provide
better security for the transmission of an image. Its future scope is the algorithm can be implemented in the text, audio, and video
transmission. NI LabVIEW with Motion and Vision toolkit is helpful in implementing the algorithm of steganography.
Fig 4 Block Diagram of Encoder
Fig 5: Front Panel of Encoder Fig 7: Front Panel of Decoder
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1345
Fig 6: Block Diagram of Decoder
REFERENCES
1. Md. Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar Mandal, and Md. Delowar Hossain: “An
Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES
Cryptography”. 3rd International Conference on Informatics, Electronics ans Vision, pp. 1-6, May 23-24, Dhaka
(2014).
2. Lita, I.; Visan, D.A.; Cioc, I.B: “LabVIEW application for movement detection using image acquisition and
processing”. IEEE 16th International Symposium on Design and Technology in Electronic Packaging (SIITME), pp.
225-228 (2010).
3. Saket Kumar, Ajay Kumar Yadav, Ashutosh Gupta, Pradeep Kumar: “RGB Image Steganography on Multiple Frame
Video using LSB Technique”. International Conference on Computer and Computational Sciences (ICCCS), pp. 226-
231, Jan 26-27, Noida (2015).
4. Rig Das, Themrichon Tuithung: “A Novel Steganography Method for Image Based on Huffman Encoding”. 3rd
National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18, March 30-
31, Shillong (2012).
5. Caixia Liu: “The Development Trend of Evaluating Face-Recognition Technology”. IEEE International Conference
on Mechatronics and Control (ICMC), pp. 1540-1544, (2014).
6. G. Prabhu Teja, S. Ravi: “Face Recognition using Subspaces Techniques”. IEEE International Conference on Recent
Trends in Information Technology (ICRTIT), pp. 103-107, (2012).
7. Taketo Horiuchi, Takuro Hada: “A Complementary Study for the Evaluation of Face Recognition Technology”. IEEE
47th International Carnahan Conference on Security Technology (ICCST), pp. 1-5, (2013).
8. Johnson, Garn LabVIEW graphical programming. 2nd Edition, TMH, (1997).
9. Jerome, Jovitha: “Virtual Instrumentation using LabVIEW”.1st Edition, PHI, (2010).
10. Wang Lei, Shen Yuming: “Design of Machine vision applications in Detection of defects in high-speed bar copper”.
IEEE International Conference on E-Product E-Service and E-Entertainment (ICEEE), pp. 1-4, (2010).
11. I. Laptev, J. Wills, P. Perez, S. J. Belongie: “Periodic Motion Detection and Segmentation via Approximate Sequence
Alignment”. IEEE International Conference on Computer Vision, vol. 1, pp. 816 – 823, (2005).
12. Surekha, P. and Sumathi, S.: “LabVIEW based Advance Instrumentation”. 1st Edition, Springer (2007).

More Related Content

What's hot

A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...IJCSIS Research Publications
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image EncryptionIRJET Journal
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET Journal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 

What's hot (20)

A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
L045056469
L045056469L045056469
L045056469
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
C010511420
C010511420C010511420
C010511420
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 

Similar to Implementation of image steganography using lab view

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingIJLT EMAS
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitYogeshIJTSRD
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 

Similar to Implementation of image steganography using lab view (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
1.pdf
1.pdf1.pdf
1.pdf
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 

Recently uploaded

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 

Implementation of image steganography using lab view

  • 1. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1341 ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com Implementation of Image Steganography using LabVIEW Shanthamma .K GSSS Institute of Engineering and Technology For Women, Mysuru, Karnataka meghashanthik97@gmail.com Sanket N. Shettar GSSS Institute of Engineering and Technology For Women, Mysuru, Karnataka sanket@gsss.edu.in Senthilkumar .S Kaynes Technology, Mysuru, Karnataka ssenthil@kaynes.com Abstract: Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography. This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new features. Keywords: Steganography, Image Processing, LabVIEW, Virtual Instrumentations (VI), Data Hiding. I. INTRODUCTION Steganography is one of the most used techniques for secure communication. It is used for to hiding the secret messages within a cover image to protect the data from the third person. To keep the message secret there are different methods to encrypt the data one of these is cryptography. In cryptography, the security was done by encryption and decryption of massage. In case of steganography, data information is hiding in cover information. Steganography overcomes the disadvantage of cryptography that the existence of message is also not visible because in some communications it is not enough to encrypt the data. In this paper, Image steganography is implemented [1]. Image steganography uses both data and covers information in image format. It hides the data information in a cover media without making any visible changes in it and the data media existence is concealed. Steganography is mainly applied to Text, Audio, Video, Image and also protocol. II. SIGNIFICANCE OF STEGANOGRAPHY The main importance of data hiding techniques comes from the fact the there is no reliability over the medium through which the information is sending, in other words, the medium is not secured. So, that some important methods are implemented it becomes very difficult for unintended user difficult to the unintended user to extract the data information from cover information [2]. Few reasons behind data hiding are.  Personal and private data  Sensitive data  Confidential data and trade secrets  To avoid misuse of data  Unintentional damage to data, human error and accidental deletion of data
  • 2. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1342  Monetary and blackmail purposes  To hide traces of crime III. IMAGE STEGANOGRAPHY Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.Many different file formats are used like Text, Audio/Video, and Image for steganography but images are more frequently used because of their frequency on the Internet. In image steganography, we see the different stenographic technique to hide secrete information in an image like. Least significant bit, Pixel value differencing Edges based data embedding method, Random pixel embedding method, mapping pixel to hidden data method, Labeling or connectivity method, Pixel intensity or gray level value based method, Texture based method, Histogram based methods, Spread Spectrum based methods and Color Palette based methods [3]. Steganography is used for the hiding of data from the third person in secrete communication. Cryptography is also one of the techniques to hide the data from an unauthorized user; here security was done by using encryption and decryption algorithm. In steganography data image is hiding in the cover image to overcome the problem of cryptography that the existence of message is also not visible because in some communications it is not enough to encrypt the data [4].It uses both data and covers information in image format. It hides the data information in a cover media without making any visible changes in it and the data media existence is concealed. Fig. 1 shows the four main categories of file formats that can be used for Steganography. Fig 1: Categories of Steganography IV. ENCODING Encoding is the first process in steganography means encoding data image in the cover image. Data image is secreting message which should be invisible to the third person. The hide data image is converting the image into pixels values in RGB format. The data image, as well as cover image, is converted into three matrixes corresponding to Red, Green and Blue components. Data image of the value of each pixel of the matrix has been searching for the corresponding cover image and store it has a global variable. From encoding process, we obtained three global variables as corresponding to Red, Green and Blue format [5].So that these global variables are key for decoding the image as shown in Fig.2. Fig 2: Encoding Process
  • 3. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1343 V. DECODING Decoding is the reverse process of encoding here we recover the hidden image from the cover image. In the decoding process, we obtained global variables called as secrete shared key.This key provides the array of Red, Green and Blue pixel values. Using these arrays to search in whole image and result will give the data image. Fig 3 shows the decoding process [6]. Fig 3 Decoding Process Here the shared secret key is a global variable which is obtained from the encoder. Final data image received is created from a cover image according to the location stored in global variable [7].Data image should not be greater in size that covers image because in between data image and cover image there should be some correlation so that location of data image can be stored in global variables [8]. VI. PROCEDURE INVOLVED IN BOTH ENCODING AND DECODING PROCESS For encoding first, we choose the cover image from file location in PC, Extract the pixels value of the cover image and then extract the RGB value of each pixel value of the cover image. Reshape the 2D RGB array of the cover image into a 1D array. After we take the data image through Vision acquisition. Extract the pixel value of data image and then reshape the 2D R, G, B array of data image to 1D array. In the encoding process, we extract the column and row size of data image and send it to global variables. Search each value of R, G, B of Data Image from the reshaped 1D R, G, B array of Cover Image and give its index value. Send this index value of RGB to global variables [8]. In decoding, we take same cover image used in encoding VI.RGB values of each pixel are extracted from the cover image and after it converts 2D RGB array of data image into a 1d array.Search the element of RGB of Data image from the Cover Image. Take the global variable for searching which is same in encoding part.It is helpful to extract 2D RGB values of data Image. Combine the RGB values and extract data image. VII. IMPLEMENTATION AND RESULTS Laboratory virtual instrumentation engineering workbench (LabVIEW) is a platform and development environment for a visual programming language from National Instruments. It is very user friendly and easy software to program any system without very deep knowledge of programming. The programming in LabVIEW is graphical programming, not a text based programming. Due to graphical programming syntax is not used so it is very easy to understand for an Engineer. In LabVIEW, we have seen two windows like Front panel and Block diagram window respectively [9]. In front panel input and output are present. This window is accessible to users, another window which in the block diagram is responsible for programming. a) Block diagram for Encoder: Encoder is implemented using LabVIEW First takes the data image and cover images are converted into a matrix of pixels values of R, G, B.pixel value of data image search in pixel values of cover image and location is stored in global variables. This global variable is used as a key for the decoder. The upper part of the figure is programming for extraction of the cover image and the lower part is for extraction of data image [10]. b) The front panel of Encoder: Here we take two inputs images, one is data image another one is the cover image. Both images are selected once and run the program so that encoding is done and pixel values of the corresponding image will be shown on the front panel. In the figure, upper image is data image and the lower image is the cover image.Here data image is encoded in cover image and then the pixel value of data image and the cover image is also as shown in the front panel [11]. c) Block diagram for Decoder: In the decoding process, we use the global variables as key for decoder obtained from encoding VI to extract the data image from the cover image. Here the reverse process of encoding takes place. d) The front panel of Decoder: In front panel of decoder we select the same cover image used in encoding. Process. Global variables used as a key for decoding Process.From these global variables, we extract the data image in the cover image. The encoded image is given as input and output is data image. So third person cannot track easily secrete information [12].
  • 4. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1344 VIII. CONCLUSION Steganography is one of the techniques used for secrete communication to protect the data from the third person. Here Steganography is implemented for security purpose where the objective is to send massage image within a cover image. It would be helpful to provide better security for the transmission of an image. Its future scope is the algorithm can be implemented in the text, audio, and video transmission. NI LabVIEW with Motion and Vision toolkit is helpful in implementing the algorithm of steganography. Fig 4 Block Diagram of Encoder Fig 5: Front Panel of Encoder Fig 7: Front Panel of Decoder
  • 5. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1345 Fig 6: Block Diagram of Decoder REFERENCES 1. Md. Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar Mandal, and Md. Delowar Hossain: “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography”. 3rd International Conference on Informatics, Electronics ans Vision, pp. 1-6, May 23-24, Dhaka (2014). 2. Lita, I.; Visan, D.A.; Cioc, I.B: “LabVIEW application for movement detection using image acquisition and processing”. IEEE 16th International Symposium on Design and Technology in Electronic Packaging (SIITME), pp. 225-228 (2010). 3. Saket Kumar, Ajay Kumar Yadav, Ashutosh Gupta, Pradeep Kumar: “RGB Image Steganography on Multiple Frame Video using LSB Technique”. International Conference on Computer and Computational Sciences (ICCCS), pp. 226- 231, Jan 26-27, Noida (2015). 4. Rig Das, Themrichon Tuithung: “A Novel Steganography Method for Image Based on Huffman Encoding”. 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18, March 30- 31, Shillong (2012). 5. Caixia Liu: “The Development Trend of Evaluating Face-Recognition Technology”. IEEE International Conference on Mechatronics and Control (ICMC), pp. 1540-1544, (2014). 6. G. Prabhu Teja, S. Ravi: “Face Recognition using Subspaces Techniques”. IEEE International Conference on Recent Trends in Information Technology (ICRTIT), pp. 103-107, (2012). 7. Taketo Horiuchi, Takuro Hada: “A Complementary Study for the Evaluation of Face Recognition Technology”. IEEE 47th International Carnahan Conference on Security Technology (ICCST), pp. 1-5, (2013). 8. Johnson, Garn LabVIEW graphical programming. 2nd Edition, TMH, (1997). 9. Jerome, Jovitha: “Virtual Instrumentation using LabVIEW”.1st Edition, PHI, (2010). 10. Wang Lei, Shen Yuming: “Design of Machine vision applications in Detection of defects in high-speed bar copper”. IEEE International Conference on E-Product E-Service and E-Entertainment (ICEEE), pp. 1-4, (2010). 11. I. Laptev, J. Wills, P. Perez, S. J. Belongie: “Periodic Motion Detection and Segmentation via Approximate Sequence Alignment”. IEEE International Conference on Computer Vision, vol. 1, pp. 816 – 823, (2005). 12. Surekha, P. and Sumathi, S.: “LabVIEW based Advance Instrumentation”. 1st Edition, Springer (2007).