SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1341
ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
Implementation of Image Steganography using LabVIEW
Shanthamma .K
GSSS Institute of Engineering and
Technology For Women, Mysuru,
Karnataka
meghashanthik97@gmail.com
Sanket N. Shettar
GSSS Institute of Engineering and
Technology For Women, Mysuru,
Karnataka
sanket@gsss.edu.in
Senthilkumar .S
Kaynes Technology, Mysuru,
Karnataka
ssenthil@kaynes.com
Abstract: Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Keywords: Steganography, Image Processing, LabVIEW, Virtual Instrumentations (VI), Data Hiding.
I. INTRODUCTION
Steganography is one of the most used techniques for secure communication. It is used for to hiding the secret messages within a
cover image to protect the data from the third person. To keep the message secret there are different methods to encrypt the data one
of these is cryptography. In cryptography, the security was done by encryption and decryption of massage. In case of steganography,
data information is hiding in cover information. Steganography overcomes the disadvantage of cryptography that the existence of
message is also not visible because in some communications it is not enough to encrypt the data. In this paper, Image steganography
is implemented [1]. Image steganography uses both data and covers information in image format. It hides the data information in a
cover media without making any visible changes in it and the data media existence is concealed. Steganography is mainly applied
to Text, Audio, Video, Image and also protocol.
II. SIGNIFICANCE OF STEGANOGRAPHY
The main importance of data hiding techniques comes from the fact the there is no reliability over the medium through which the
information is sending, in other words, the medium is not secured. So, that some important methods are implemented it becomes
very difficult for unintended user difficult to the unintended user to extract the data information from cover information [2]. Few
reasons behind data hiding are.
 Personal and private data
 Sensitive data
 Confidential data and trade secrets
 To avoid misuse of data
 Unintentional damage to data, human error and accidental deletion of data
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1342
 Monetary and blackmail purposes
 To hide traces of crime
III. IMAGE STEGANOGRAPHY
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.Many
different file formats are used like Text, Audio/Video, and Image for steganography but images are more frequently used because
of their frequency on the Internet. In image steganography, we see the different stenographic technique to hide secrete information
in an image like. Least significant bit, Pixel value differencing Edges based data embedding method, Random pixel embedding
method, mapping pixel to hidden data method, Labeling or connectivity method, Pixel intensity or gray level value based method,
Texture based method, Histogram based methods, Spread Spectrum based methods and Color Palette based methods [3].
Steganography is used for the hiding of data from the third person in secrete communication. Cryptography is also one of the
techniques to hide the data from an unauthorized user; here security was done by using encryption and decryption algorithm. In
steganography data image is hiding in the cover image to overcome the problem of cryptography that the existence of message is
also not visible because in some communications it is not enough to encrypt the data [4].It uses both data and covers information in
image format. It hides the data information in a cover media without making any visible changes in it and the data media existence
is concealed. Fig. 1 shows the four main categories of file formats that can be used for Steganography.
Fig 1: Categories of Steganography
IV. ENCODING
Encoding is the first process in steganography means encoding data image in the cover image. Data image is secreting message
which should be invisible to the third person. The hide data image is converting the image into pixels values in RGB format. The
data image, as well as cover image, is converted into three matrixes corresponding to Red, Green and Blue components. Data image
of the value of each pixel of the matrix has been searching for the corresponding cover image and store it has a global variable.
From encoding process, we obtained three global variables as corresponding to Red, Green and Blue format [5].So that these global
variables are key for decoding the image as shown in Fig.2.
Fig 2: Encoding Process
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1343
V. DECODING
Decoding is the reverse process of encoding here we recover the hidden image from the cover image. In the decoding process, we
obtained global variables called as secrete shared key.This key provides the array of Red, Green and Blue pixel values. Using these
arrays to search in whole image and result will give the data image. Fig 3 shows the decoding process [6].
Fig 3 Decoding Process
Here the shared secret key is a global variable which is obtained from the encoder. Final data image received is created from a cover
image according to the location stored in global variable [7].Data image should not be greater in size that covers image because in
between data image and cover image there should be some correlation so that location of data image can be stored in global variables
[8].
VI. PROCEDURE INVOLVED IN BOTH ENCODING AND DECODING PROCESS
For encoding first, we choose the cover image from file location in PC, Extract the pixels value of the cover image and then extract
the RGB value of each pixel value of the cover image. Reshape the 2D RGB array of the cover image into a 1D array. After we take
the data image through Vision acquisition. Extract the pixel value of data image and then reshape the 2D R, G, B array of data image
to 1D array. In the encoding process, we extract the column and row size of data image and send it to global variables. Search each
value of R, G, B of Data Image from the reshaped 1D R, G, B array of Cover Image and give its index value. Send this index value
of RGB to global variables [8].
In decoding, we take same cover image used in encoding VI.RGB values of each pixel are extracted from the cover image and after
it converts 2D RGB array of data image into a 1d array.Search the element of RGB of Data image from the Cover Image. Take the
global variable for searching which is same in encoding part.It is helpful to extract 2D RGB values of data Image. Combine the
RGB values and extract data image.
VII. IMPLEMENTATION AND RESULTS
Laboratory virtual instrumentation engineering workbench (LabVIEW) is a platform and development environment for a visual
programming language from National Instruments. It is very user friendly and easy software to program any system without very
deep knowledge of programming. The programming in LabVIEW is graphical programming, not a text based programming. Due
to graphical programming syntax is not used so it is very easy to understand for an
Engineer. In LabVIEW, we have seen two windows like Front panel and Block diagram window respectively [9]. In front panel
input and output are present. This window is accessible to users, another window which in the block diagram is responsible for
programming.
a) Block diagram for Encoder: Encoder is implemented using LabVIEW First takes the data image and cover images are
converted into a matrix of pixels values of R, G, B.pixel value of data image search in pixel values of cover image and
location is stored in global variables. This global variable is used as a key for the decoder. The upper part of the figure is
programming for extraction of the cover image and the lower part is for extraction of data image [10].
b) The front panel of Encoder: Here we take two inputs images, one is data image another one is the cover image. Both
images are selected once and run the program so that encoding is done and pixel values of the corresponding image will
be shown on the front panel. In the figure, upper image is data image and the lower image is the cover image.Here data
image is encoded in cover image and then the pixel value of data image and the cover image is also as shown in the front
panel [11].
c) Block diagram for Decoder: In the decoding process, we use the global variables as key for decoder obtained from
encoding VI to extract the data image from the cover image. Here the reverse process of encoding takes place.
d) The front panel of Decoder: In front panel of decoder we select the same cover image used in encoding. Process. Global
variables used as a key for decoding Process.From these global variables, we extract the data image in the cover image.
The encoded image is given as input and output is data image. So third person cannot track easily secrete information [12].
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1344
VIII. CONCLUSION
Steganography is one of the techniques used for secrete communication to protect the data from the third person. Here Steganography
is implemented for security purpose where the objective is to send massage image within a cover image. It would be helpful to provide
better security for the transmission of an image. Its future scope is the algorithm can be implemented in the text, audio, and video
transmission. NI LabVIEW with Motion and Vision toolkit is helpful in implementing the algorithm of steganography.
Fig 4 Block Diagram of Encoder
Fig 5: Front Panel of Encoder Fig 7: Front Panel of Decoder
K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in
Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1345
Fig 6: Block Diagram of Decoder
REFERENCES
1. Md. Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar Mandal, and Md. Delowar Hossain: “An
Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES
Cryptography”. 3rd International Conference on Informatics, Electronics ans Vision, pp. 1-6, May 23-24, Dhaka
(2014).
2. Lita, I.; Visan, D.A.; Cioc, I.B: “LabVIEW application for movement detection using image acquisition and
processing”. IEEE 16th International Symposium on Design and Technology in Electronic Packaging (SIITME), pp.
225-228 (2010).
3. Saket Kumar, Ajay Kumar Yadav, Ashutosh Gupta, Pradeep Kumar: “RGB Image Steganography on Multiple Frame
Video using LSB Technique”. International Conference on Computer and Computational Sciences (ICCCS), pp. 226-
231, Jan 26-27, Noida (2015).
4. Rig Das, Themrichon Tuithung: “A Novel Steganography Method for Image Based on Huffman Encoding”. 3rd
National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18, March 30-
31, Shillong (2012).
5. Caixia Liu: “The Development Trend of Evaluating Face-Recognition Technology”. IEEE International Conference
on Mechatronics and Control (ICMC), pp. 1540-1544, (2014).
6. G. Prabhu Teja, S. Ravi: “Face Recognition using Subspaces Techniques”. IEEE International Conference on Recent
Trends in Information Technology (ICRTIT), pp. 103-107, (2012).
7. Taketo Horiuchi, Takuro Hada: “A Complementary Study for the Evaluation of Face Recognition Technology”. IEEE
47th International Carnahan Conference on Security Technology (ICCST), pp. 1-5, (2013).
8. Johnson, Garn LabVIEW graphical programming. 2nd Edition, TMH, (1997).
9. Jerome, Jovitha: “Virtual Instrumentation using LabVIEW”.1st Edition, PHI, (2010).
10. Wang Lei, Shen Yuming: “Design of Machine vision applications in Detection of defects in high-speed bar copper”.
IEEE International Conference on E-Product E-Service and E-Entertainment (ICEEE), pp. 1-4, (2010).
11. I. Laptev, J. Wills, P. Perez, S. J. Belongie: “Periodic Motion Detection and Segmentation via Approximate Sequence
Alignment”. IEEE International Conference on Computer Vision, vol. 1, pp. 816 – 823, (2005).
12. Surekha, P. and Sumathi, S.: “LabVIEW based Advance Instrumentation”. 1st Edition, Springer (2007).

Mais conteúdo relacionado

Mais procurados

A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...IJCSIS Research Publications
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image EncryptionIRJET Journal
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET Journal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 

Mais procurados (20)

A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
L045056469
L045056469L045056469
L045056469
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
C010511420
C010511420C010511420
C010511420
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 

Semelhante a Implementation of image steganography using lab view

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingIJLT EMAS
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitYogeshIJTSRD
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 

Semelhante a Implementation of image steganography using lab view (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
1.pdf
1.pdf1.pdf
1.pdf
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 

Último

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 

Último (20)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Implementation of image steganography using lab view

  • 1. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1341 ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com Implementation of Image Steganography using LabVIEW Shanthamma .K GSSS Institute of Engineering and Technology For Women, Mysuru, Karnataka meghashanthik97@gmail.com Sanket N. Shettar GSSS Institute of Engineering and Technology For Women, Mysuru, Karnataka sanket@gsss.edu.in Senthilkumar .S Kaynes Technology, Mysuru, Karnataka ssenthil@kaynes.com Abstract: Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography. This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new features. Keywords: Steganography, Image Processing, LabVIEW, Virtual Instrumentations (VI), Data Hiding. I. INTRODUCTION Steganography is one of the most used techniques for secure communication. It is used for to hiding the secret messages within a cover image to protect the data from the third person. To keep the message secret there are different methods to encrypt the data one of these is cryptography. In cryptography, the security was done by encryption and decryption of massage. In case of steganography, data information is hiding in cover information. Steganography overcomes the disadvantage of cryptography that the existence of message is also not visible because in some communications it is not enough to encrypt the data. In this paper, Image steganography is implemented [1]. Image steganography uses both data and covers information in image format. It hides the data information in a cover media without making any visible changes in it and the data media existence is concealed. Steganography is mainly applied to Text, Audio, Video, Image and also protocol. II. SIGNIFICANCE OF STEGANOGRAPHY The main importance of data hiding techniques comes from the fact the there is no reliability over the medium through which the information is sending, in other words, the medium is not secured. So, that some important methods are implemented it becomes very difficult for unintended user difficult to the unintended user to extract the data information from cover information [2]. Few reasons behind data hiding are.  Personal and private data  Sensitive data  Confidential data and trade secrets  To avoid misuse of data  Unintentional damage to data, human error and accidental deletion of data
  • 2. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1342  Monetary and blackmail purposes  To hide traces of crime III. IMAGE STEGANOGRAPHY Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.Many different file formats are used like Text, Audio/Video, and Image for steganography but images are more frequently used because of their frequency on the Internet. In image steganography, we see the different stenographic technique to hide secrete information in an image like. Least significant bit, Pixel value differencing Edges based data embedding method, Random pixel embedding method, mapping pixel to hidden data method, Labeling or connectivity method, Pixel intensity or gray level value based method, Texture based method, Histogram based methods, Spread Spectrum based methods and Color Palette based methods [3]. Steganography is used for the hiding of data from the third person in secrete communication. Cryptography is also one of the techniques to hide the data from an unauthorized user; here security was done by using encryption and decryption algorithm. In steganography data image is hiding in the cover image to overcome the problem of cryptography that the existence of message is also not visible because in some communications it is not enough to encrypt the data [4].It uses both data and covers information in image format. It hides the data information in a cover media without making any visible changes in it and the data media existence is concealed. Fig. 1 shows the four main categories of file formats that can be used for Steganography. Fig 1: Categories of Steganography IV. ENCODING Encoding is the first process in steganography means encoding data image in the cover image. Data image is secreting message which should be invisible to the third person. The hide data image is converting the image into pixels values in RGB format. The data image, as well as cover image, is converted into three matrixes corresponding to Red, Green and Blue components. Data image of the value of each pixel of the matrix has been searching for the corresponding cover image and store it has a global variable. From encoding process, we obtained three global variables as corresponding to Red, Green and Blue format [5].So that these global variables are key for decoding the image as shown in Fig.2. Fig 2: Encoding Process
  • 3. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1343 V. DECODING Decoding is the reverse process of encoding here we recover the hidden image from the cover image. In the decoding process, we obtained global variables called as secrete shared key.This key provides the array of Red, Green and Blue pixel values. Using these arrays to search in whole image and result will give the data image. Fig 3 shows the decoding process [6]. Fig 3 Decoding Process Here the shared secret key is a global variable which is obtained from the encoder. Final data image received is created from a cover image according to the location stored in global variable [7].Data image should not be greater in size that covers image because in between data image and cover image there should be some correlation so that location of data image can be stored in global variables [8]. VI. PROCEDURE INVOLVED IN BOTH ENCODING AND DECODING PROCESS For encoding first, we choose the cover image from file location in PC, Extract the pixels value of the cover image and then extract the RGB value of each pixel value of the cover image. Reshape the 2D RGB array of the cover image into a 1D array. After we take the data image through Vision acquisition. Extract the pixel value of data image and then reshape the 2D R, G, B array of data image to 1D array. In the encoding process, we extract the column and row size of data image and send it to global variables. Search each value of R, G, B of Data Image from the reshaped 1D R, G, B array of Cover Image and give its index value. Send this index value of RGB to global variables [8]. In decoding, we take same cover image used in encoding VI.RGB values of each pixel are extracted from the cover image and after it converts 2D RGB array of data image into a 1d array.Search the element of RGB of Data image from the Cover Image. Take the global variable for searching which is same in encoding part.It is helpful to extract 2D RGB values of data Image. Combine the RGB values and extract data image. VII. IMPLEMENTATION AND RESULTS Laboratory virtual instrumentation engineering workbench (LabVIEW) is a platform and development environment for a visual programming language from National Instruments. It is very user friendly and easy software to program any system without very deep knowledge of programming. The programming in LabVIEW is graphical programming, not a text based programming. Due to graphical programming syntax is not used so it is very easy to understand for an Engineer. In LabVIEW, we have seen two windows like Front panel and Block diagram window respectively [9]. In front panel input and output are present. This window is accessible to users, another window which in the block diagram is responsible for programming. a) Block diagram for Encoder: Encoder is implemented using LabVIEW First takes the data image and cover images are converted into a matrix of pixels values of R, G, B.pixel value of data image search in pixel values of cover image and location is stored in global variables. This global variable is used as a key for the decoder. The upper part of the figure is programming for extraction of the cover image and the lower part is for extraction of data image [10]. b) The front panel of Encoder: Here we take two inputs images, one is data image another one is the cover image. Both images are selected once and run the program so that encoding is done and pixel values of the corresponding image will be shown on the front panel. In the figure, upper image is data image and the lower image is the cover image.Here data image is encoded in cover image and then the pixel value of data image and the cover image is also as shown in the front panel [11]. c) Block diagram for Decoder: In the decoding process, we use the global variables as key for decoder obtained from encoding VI to extract the data image from the cover image. Here the reverse process of encoding takes place. d) The front panel of Decoder: In front panel of decoder we select the same cover image used in encoding. Process. Global variables used as a key for decoding Process.From these global variables, we extract the data image in the cover image. The encoded image is given as input and output is data image. So third person cannot track easily secrete information [12].
  • 4. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1344 VIII. CONCLUSION Steganography is one of the techniques used for secrete communication to protect the data from the third person. Here Steganography is implemented for security purpose where the objective is to send massage image within a cover image. It would be helpful to provide better security for the transmission of an image. Its future scope is the algorithm can be implemented in the text, audio, and video transmission. NI LabVIEW with Motion and Vision toolkit is helpful in implementing the algorithm of steganography. Fig 4 Block Diagram of Encoder Fig 5: Front Panel of Encoder Fig 7: Front Panel of Decoder
  • 5. K. Shanthamma, Shettar Sanket .N, S. Senthilkumar, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1345 Fig 6: Block Diagram of Decoder REFERENCES 1. Md. Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis Kumar Mandal, and Md. Delowar Hossain: “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography”. 3rd International Conference on Informatics, Electronics ans Vision, pp. 1-6, May 23-24, Dhaka (2014). 2. Lita, I.; Visan, D.A.; Cioc, I.B: “LabVIEW application for movement detection using image acquisition and processing”. IEEE 16th International Symposium on Design and Technology in Electronic Packaging (SIITME), pp. 225-228 (2010). 3. Saket Kumar, Ajay Kumar Yadav, Ashutosh Gupta, Pradeep Kumar: “RGB Image Steganography on Multiple Frame Video using LSB Technique”. International Conference on Computer and Computational Sciences (ICCCS), pp. 226- 231, Jan 26-27, Noida (2015). 4. Rig Das, Themrichon Tuithung: “A Novel Steganography Method for Image Based on Huffman Encoding”. 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14-18, March 30- 31, Shillong (2012). 5. Caixia Liu: “The Development Trend of Evaluating Face-Recognition Technology”. IEEE International Conference on Mechatronics and Control (ICMC), pp. 1540-1544, (2014). 6. G. Prabhu Teja, S. Ravi: “Face Recognition using Subspaces Techniques”. IEEE International Conference on Recent Trends in Information Technology (ICRTIT), pp. 103-107, (2012). 7. Taketo Horiuchi, Takuro Hada: “A Complementary Study for the Evaluation of Face Recognition Technology”. IEEE 47th International Carnahan Conference on Security Technology (ICCST), pp. 1-5, (2013). 8. Johnson, Garn LabVIEW graphical programming. 2nd Edition, TMH, (1997). 9. Jerome, Jovitha: “Virtual Instrumentation using LabVIEW”.1st Edition, PHI, (2010). 10. Wang Lei, Shen Yuming: “Design of Machine vision applications in Detection of defects in high-speed bar copper”. IEEE International Conference on E-Product E-Service and E-Entertainment (ICEEE), pp. 1-4, (2010). 11. I. Laptev, J. Wills, P. Perez, S. J. Belongie: “Periodic Motion Detection and Segmentation via Approximate Sequence Alignment”. IEEE International Conference on Computer Vision, vol. 1, pp. 816 – 823, (2005). 12. Surekha, P. and Sumathi, S.: “LabVIEW based Advance Instrumentation”. 1st Edition, Springer (2007).