SlideShare a Scribd company logo
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1341
ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
Implementation of Image Steganography using LabVIEW
Shanthamma .K
GSSS Institute of Engineering and
Technology For Women, Mysuru,
Karnataka
meghashanthik97@gmail.com
Sanket N. Shettar
GSSS Institute of Engineering and
Technology For Women, Mysuru,
Karnataka
sanket@gsss.edu.in
Senthilkumar .S
Kaynes Technology, Mysuru,
Karnataka
ssenthil@kaynes.com
Abstract: Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Keywords: Steganography, Image Processing, LabVIEW, Virtual Instrumentations (VI), Data Hiding.
I. INTRODUCTION
Steganography is one of the most used techniques for secure communication. It is used for to hiding the secret messages within a
cover image to protect the data from the third person. To keep the message secret there are different methods to encrypt the data one
of these is cryptography. In cryptography, the security was done by encryption and decryption of massage. In case of steganography,
data information is hiding in cover information. Steganography overcomes the disadvantage of cryptography that the existence of
message is also not visible because in some communications it is not enough to encrypt the data. In this paper, Image steganography
is implemented [1]. Image steganography uses both data and covers information in image format. It hides the data information in a
cover media without making any visible changes in it and the data media existence is concealed. Steganography is mainly applied
to Text, Audio, Video, Image and also protocol.
II. SIGNIFICANCE OF STEGANOGRAPHY
The main importance of data hiding techniques comes from the fact the there is no reliability over the medium through which the
information is sending, in other words, the medium is not secured. So, that some important methods are implemented it becomes
very difficult for unintended user difficult to the unintended user to extract the data information from cover information [2]. Few
reasons behind data hiding are.
 Personal and private data
 Sensitive data
 Confidential data and trade secrets
 To avoid misuse of data
 Unintentional damage to data, human error and accidental deletion of data
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1342
 Monetary and blackmail purposes
 To hide traces of crime
III. IMAGE STEGANOGRAPHY
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.Many
different file formats are used like Text, Audio/Video, and Image for steganography but images are more frequently used because
of their frequency on the Internet. In image steganography, we see the different stenographic technique to hide secrete information
in an image like. Least significant bit, Pixel value differencing Edges based data embedding method, Random pixel embedding
method, mapping pixel to hidden data method, Labeling or connectivity method, Pixel intensity or gray level value based method,
Texture based method, Histogram based methods, Spread Spectrum based methods and Color Palette based methods [3].
Steganography is used for the hiding of data from the third person in secrete communication. Cryptography is also one of the
techniques to hide the data from an unauthorized user; here security was done by using encryption and decryption algorithm. In
steganography data image is hiding in the cover image to overcome the problem of cryptography that the existence of message is
also not visible because in some communications it is not enough to encrypt the data [4].It uses both data and covers information in
image format. It hides the data information in a cover media without making any visible changes in it and the data media existence
is concealed. Fig. 1 shows the four main categories of file formats that can be used for Steganography.
Fig 1: Categories of Steganography
IV. ENCODING
Encoding is the first process in steganography means encoding data image in the cover image. Data image is secreting message
which should be invisible to the third person. The hide data image is converting the image into pixels values in RGB format. The
data image, as well as cover image, is converted into three matrixes corresponding to Red, Green and Blue components. Data image
of the value of each pixel of the matrix has been searching for the corresponding cover image and store it has a global variable.
From encoding process, we obtained three global variables as corresponding to Red, Green and Blue format [5].So that these global
variables are key for decoding the image as shown in Fig.2.
Fig 2: Encoding Process
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1343
V. DECODING
Decoding is the reverse process of encoding here we recover the hidden image from the cover image. In the decoding process, we
obtained global variables called as secrete shared key.This key provides the array of Red, Green and Blue pixel values. Using these
arrays to search in whole image and result will give the data image. Fig 3 shows the decoding process [6].
Fig 3 Decoding Process
Here the shared secret key is a global variable which is obtained from the encoder. Final data image received is created from a cover
image according to the location stored in global variable [7].Data image should not be greater in size that covers image because in
between data image and cover image there should be some correlation so that location of data image can be stored in global variables
[8].
VI. PROCEDURE INVOLVED IN BOTH ENCODING AND DECODING PROCESS
For encoding first, we choose the cover image from file location in PC, Extract the pixels value of the cover image and then extract
the RGB value of each pixel value of the cover image. Reshape the 2D RGB array of the cover image into a 1D array. After we take
the data image through Vision acquisition. Extract the pixel value of data image and then reshape the 2D R, G, B array of data image
to 1D array. In the encoding process, we extract the column and row size of data image and send it to global variables. Search each
value of R, G, B of Data Image from the reshaped 1D R, G, B array of Cover Image and give its index value. Send this index value
of RGB to global variables [8].
In decoding, we take same cover image used in encoding VI.RGB values of each pixel are extracted from the cover image and after
it converts 2D RGB array of data image into a 1d array.Search the element of RGB of Data image from the Cover Image. Take the
global variable for searching which is same in encoding part.It is helpful to extract 2D RGB values of data Image. Combine the
RGB values and extract data image.
VII. IMPLEMENTATION AND RESULTS
Laboratory virtual instrumentation engineering workbench (LabVIEW) is a platform and development environment for a visual
programming language from National Instruments. It is very user friendly and easy software to program any system without very
deep knowledge of programming. The programming in LabVIEW is graphical programming, not a text based programming. Due
to graphical programming syntax is not used so it is very easy to understand for an
Engineer. In LabVIEW, we have seen two windows like Front panel and Block diagram window respectively [9]. In front panel
input and output are present. This window is accessible to users, another window which in the block diagram is responsible for
programming.
a) Block diagram for Encoder: Encoder is implemented using LabVIEW First takes the data image and cover images are
converted into a matrix of pixels values of R, G, B.pixel value of data image search in pixel values of cover image and
location is stored in global variables. This global variable is used as a key for the decoder. The upper part of the figure is
programming for extraction of the cover image and the lower part is for extraction of data image [10].
b) The front panel of Encoder: Here we take two inputs images, one is data image another one is the cover image. Both
images are selected once and run the program so that encoding is done and pixel values of the corresponding image will
be shown on the front panel. In the figure, upper image is data image and the lower image is the cover image.Here data
image is encoded in cover image and then the pixel value of data image and the cover image is also as shown in the front
panel [11].
c) Block diagram for Decoder: In the decoding process, we use the global variables as key for decoder obtained from
encoding VI to extract the data image from the cover image. Here the reverse process of encoding takes place.
d) The front panel of Decoder: In front panel of decoder we select the same cover image used in encoding. Process. Global
variables used as a key for decoding Process.From these global variables, we extract the data image in the cover image.
The encoded image is given as input and output is data image. So third person cannot track easily secrete information [12].
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1344
VIII. CONCLUSION
Steganography is one of the techniques used for secrete communication to protect the data from the third person. Here Steganography
is implemented for security purpose where the objective is to send massage image within a cover image. It would be helpful to provide
better security for the transmission of an image. Its future scope is the algorithm can be implemented in the text, audio, and video
transmission. NI LabVIEW with Motion and Vision toolkit is helpful in implementing the algorithm of steganography.
Fig 4 Block Diagram of Encoder
Fig 5: Front Panel of Encoder Fig 7: Front Panel of Decoder
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1345
Fig 6: Block Diagram of Decoder
REFERENCES
1. Md. Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar Mandal, and Md. Delowar Hossain: “An
Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES
Cryptography”. 3rd International Conference on Informatics, Electronics ans Vision, pp. 1-6, May 23-24, Dhaka
(2014).
2. Lita, I.; Visan, D.A.; Cioc, I.B: “LabVIEW application for movement detection using image acquisition and
processing”. IEEE 16th International Symposium on Design and Technology in Electronic Packaging (SIITME), pp.
225-228 (2010).
3. Saket Kumar, Ajay Kumar Yadav, Ashutosh Gupta, Pradeep Kumar: “RGB Image Steganography on Multiple Frame
Video using LSB Technique”. International Conference on Computer and Computational Sciences (ICCCS), pp. 226-
231, Jan 26-27, Noida (2015).
4. Rig Das, Themrichon Tuithung: “A Novel Steganography Method for Image Based on Huffman Encoding”. 3rd
National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18, March 30-
31, Shillong (2012).
5. Caixia Liu: “The Development Trend of Evaluating Face-Recognition Technology”. IEEE International Conference
on Mechatronics and Control (ICMC), pp. 1540-1544, (2014).
6. G. Prabhu Teja, S. Ravi: “Face Recognition using Subspaces Techniques”. IEEE International Conference on Recent
Trends in Information Technology (ICRTIT), pp. 103-107, (2012).
7. Taketo Horiuchi, Takuro Hada: “A Complementary Study for the Evaluation of Face Recognition Technology”. IEEE
47th International Carnahan Conference on Security Technology (ICCST), pp. 1-5, (2013).
8. Johnson, Garn LabVIEW graphical programming. 2nd Edition, TMH, (1997).
9. Jerome, Jovitha: “Virtual Instrumentation using LabVIEW”.1st Edition, PHI, (2010).
10. Wang Lei, Shen Yuming: “Design of Machine vision applications in Detection of defects in high-speed bar copper”.
IEEE International Conference on E-Product E-Service and E-Entertainment (ICEEE), pp. 1-4, (2010).
11. I. Laptev, J. Wills, P. Perez, S. J. Belongie: “Periodic Motion Detection and Segmentation via Approximate Sequence
Alignment”. IEEE International Conference on Computer Vision, vol. 1, pp. 816 – 823, (2005).
12. Surekha, P. and Sumathi, S.: “LabVIEW based Advance Instrumentation”. 1st Edition, Springer (2007).

More Related Content

What's hot

A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
IJCSIS Research Publications
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
IRJET Journal
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET Journal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
L045056469
L045056469L045056469
L045056469
IJERA Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
Editor IJMTER
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
IJECEIAES
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 

What's hot (20)

A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
L045056469
L045056469L045056469
L045056469
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
C010511420
C010511420C010511420
C010511420
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 

Similar to Implementation of image steganography using lab view

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
IJERA Editor
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
IJLT EMAS
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 
1.pdf
1.pdf1.pdf
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
 

Similar to Implementation of image steganography using lab view (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
1.pdf
1.pdf1.pdf
1.pdf
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 

Recently uploaded

办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 

Recently uploaded (20)

办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 

Implementation of image steganography using lab view

  • 1. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1341 ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com Implementation of Image Steganography using LabVIEW Shanthamma .K GSSS Institute of Engineering and Technology For Women, Mysuru, Karnataka meghashanthik97@gmail.com Sanket N. Shettar GSSS Institute of Engineering and Technology For Women, Mysuru, Karnataka sanket@gsss.edu.in Senthilkumar .S Kaynes Technology, Mysuru, Karnataka ssenthil@kaynes.com Abstract: Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography. This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new features. Keywords: Steganography, Image Processing, LabVIEW, Virtual Instrumentations (VI), Data Hiding. I. INTRODUCTION Steganography is one of the most used techniques for secure communication. It is used for to hiding the secret messages within a cover image to protect the data from the third person. To keep the message secret there are different methods to encrypt the data one of these is cryptography. In cryptography, the security was done by encryption and decryption of massage. In case of steganography, data information is hiding in cover information. Steganography overcomes the disadvantage of cryptography that the existence of message is also not visible because in some communications it is not enough to encrypt the data. In this paper, Image steganography is implemented [1]. Image steganography uses both data and covers information in image format. It hides the data information in a cover media without making any visible changes in it and the data media existence is concealed. Steganography is mainly applied to Text, Audio, Video, Image and also protocol. II. SIGNIFICANCE OF STEGANOGRAPHY The main importance of data hiding techniques comes from the fact the there is no reliability over the medium through which the information is sending, in other words, the medium is not secured. So, that some important methods are implemented it becomes very difficult for unintended user difficult to the unintended user to extract the data information from cover information [2]. Few reasons behind data hiding are.  Personal and private data  Sensitive data  Confidential data and trade secrets  To avoid misuse of data  Unintentional damage to data, human error and accidental deletion of data
  • 2. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1342  Monetary and blackmail purposes  To hide traces of crime III. IMAGE STEGANOGRAPHY Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.Many different file formats are used like Text, Audio/Video, and Image for steganography but images are more frequently used because of their frequency on the Internet. In image steganography, we see the different stenographic technique to hide secrete information in an image like. Least significant bit, Pixel value differencing Edges based data embedding method, Random pixel embedding method, mapping pixel to hidden data method, Labeling or connectivity method, Pixel intensity or gray level value based method, Texture based method, Histogram based methods, Spread Spectrum based methods and Color Palette based methods [3]. Steganography is used for the hiding of data from the third person in secrete communication. Cryptography is also one of the techniques to hide the data from an unauthorized user; here security was done by using encryption and decryption algorithm. In steganography data image is hiding in the cover image to overcome the problem of cryptography that the existence of message is also not visible because in some communications it is not enough to encrypt the data [4].It uses both data and covers information in image format. It hides the data information in a cover media without making any visible changes in it and the data media existence is concealed. Fig. 1 shows the four main categories of file formats that can be used for Steganography. Fig 1: Categories of Steganography IV. ENCODING Encoding is the first process in steganography means encoding data image in the cover image. Data image is secreting message which should be invisible to the third person. The hide data image is converting the image into pixels values in RGB format. The data image, as well as cover image, is converted into three matrixes corresponding to Red, Green and Blue components. Data image of the value of each pixel of the matrix has been searching for the corresponding cover image and store it has a global variable. From encoding process, we obtained three global variables as corresponding to Red, Green and Blue format [5].So that these global variables are key for decoding the image as shown in Fig.2. Fig 2: Encoding Process
  • 3. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1343 V. DECODING Decoding is the reverse process of encoding here we recover the hidden image from the cover image. In the decoding process, we obtained global variables called as secrete shared key.This key provides the array of Red, Green and Blue pixel values. Using these arrays to search in whole image and result will give the data image. Fig 3 shows the decoding process [6]. Fig 3 Decoding Process Here the shared secret key is a global variable which is obtained from the encoder. Final data image received is created from a cover image according to the location stored in global variable [7].Data image should not be greater in size that covers image because in between data image and cover image there should be some correlation so that location of data image can be stored in global variables [8]. VI. PROCEDURE INVOLVED IN BOTH ENCODING AND DECODING PROCESS For encoding first, we choose the cover image from file location in PC, Extract the pixels value of the cover image and then extract the RGB value of each pixel value of the cover image. Reshape the 2D RGB array of the cover image into a 1D array. After we take the data image through Vision acquisition. Extract the pixel value of data image and then reshape the 2D R, G, B array of data image to 1D array. In the encoding process, we extract the column and row size of data image and send it to global variables. Search each value of R, G, B of Data Image from the reshaped 1D R, G, B array of Cover Image and give its index value. Send this index value of RGB to global variables [8]. In decoding, we take same cover image used in encoding VI.RGB values of each pixel are extracted from the cover image and after it converts 2D RGB array of data image into a 1d array.Search the element of RGB of Data image from the Cover Image. Take the global variable for searching which is same in encoding part.It is helpful to extract 2D RGB values of data Image. Combine the RGB values and extract data image. VII. IMPLEMENTATION AND RESULTS Laboratory virtual instrumentation engineering workbench (LabVIEW) is a platform and development environment for a visual programming language from National Instruments. It is very user friendly and easy software to program any system without very deep knowledge of programming. The programming in LabVIEW is graphical programming, not a text based programming. Due to graphical programming syntax is not used so it is very easy to understand for an Engineer. In LabVIEW, we have seen two windows like Front panel and Block diagram window respectively [9]. In front panel input and output are present. This window is accessible to users, another window which in the block diagram is responsible for programming. a) Block diagram for Encoder: Encoder is implemented using LabVIEW First takes the data image and cover images are converted into a matrix of pixels values of R, G, B.pixel value of data image search in pixel values of cover image and location is stored in global variables. This global variable is used as a key for the decoder. The upper part of the figure is programming for extraction of the cover image and the lower part is for extraction of data image [10]. b) The front panel of Encoder: Here we take two inputs images, one is data image another one is the cover image. Both images are selected once and run the program so that encoding is done and pixel values of the corresponding image will be shown on the front panel. In the figure, upper image is data image and the lower image is the cover image.Here data image is encoded in cover image and then the pixel value of data image and the cover image is also as shown in the front panel [11]. c) Block diagram for Decoder: In the decoding process, we use the global variables as key for decoder obtained from encoding VI to extract the data image from the cover image. Here the reverse process of encoding takes place. d) The front panel of Decoder: In front panel of decoder we select the same cover image used in encoding. Process. Global variables used as a key for decoding Process.From these global variables, we extract the data image in the cover image. The encoded image is given as input and output is data image. So third person cannot track easily secrete information [12].
  • 4. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1344 VIII. CONCLUSION Steganography is one of the techniques used for secrete communication to protect the data from the third person. Here Steganography is implemented for security purpose where the objective is to send massage image within a cover image. It would be helpful to provide better security for the transmission of an image. Its future scope is the algorithm can be implemented in the text, audio, and video transmission. NI LabVIEW with Motion and Vision toolkit is helpful in implementing the algorithm of steganography. Fig 4 Block Diagram of Encoder Fig 5: Front Panel of Encoder Fig 7: Front Panel of Decoder
  • 5. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1345 Fig 6: Block Diagram of Decoder REFERENCES 1. Md. Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar Mandal, and Md. Delowar Hossain: “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography”. 3rd International Conference on Informatics, Electronics ans Vision, pp. 1-6, May 23-24, Dhaka (2014). 2. Lita, I.; Visan, D.A.; Cioc, I.B: “LabVIEW application for movement detection using image acquisition and processing”. IEEE 16th International Symposium on Design and Technology in Electronic Packaging (SIITME), pp. 225-228 (2010). 3. Saket Kumar, Ajay Kumar Yadav, Ashutosh Gupta, Pradeep Kumar: “RGB Image Steganography on Multiple Frame Video using LSB Technique”. International Conference on Computer and Computational Sciences (ICCCS), pp. 226- 231, Jan 26-27, Noida (2015). 4. Rig Das, Themrichon Tuithung: “A Novel Steganography Method for Image Based on Huffman Encoding”. 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18, March 30- 31, Shillong (2012). 5. Caixia Liu: “The Development Trend of Evaluating Face-Recognition Technology”. IEEE International Conference on Mechatronics and Control (ICMC), pp. 1540-1544, (2014). 6. G. Prabhu Teja, S. Ravi: “Face Recognition using Subspaces Techniques”. IEEE International Conference on Recent Trends in Information Technology (ICRTIT), pp. 103-107, (2012). 7. Taketo Horiuchi, Takuro Hada: “A Complementary Study for the Evaluation of Face Recognition Technology”. IEEE 47th International Carnahan Conference on Security Technology (ICCST), pp. 1-5, (2013). 8. Johnson, Garn LabVIEW graphical programming. 2nd Edition, TMH, (1997). 9. Jerome, Jovitha: “Virtual Instrumentation using LabVIEW”.1st Edition, PHI, (2010). 10. Wang Lei, Shen Yuming: “Design of Machine vision applications in Detection of defects in high-speed bar copper”. IEEE International Conference on E-Product E-Service and E-Entertainment (ICEEE), pp. 1-4, (2010). 11. I. Laptev, J. Wills, P. Perez, S. J. Belongie: “Periodic Motion Detection and Segmentation via Approximate Sequence Alignment”. IEEE International Conference on Computer Vision, vol. 1, pp. 816 – 823, (2005). 12. Surekha, P. and Sumathi, S.: “LabVIEW based Advance Instrumentation”. 1st Edition, Springer (2007).