Abstract
This paper presents the implementation of a highly secured data hiding technique called Steganography. This technique is applicable for image data type. The goal is to encode the data image within the cover image such that the data image’s existence is concealed. Cover media for image based steganography is image. Steganography deals with encoding data image information in a given image (called cover image) without making any visible changes to it. For advance security face recognition technique is used, so that only authorized person can access the data image. In this system dual security is provide first is encoding of data image in cover image and second is face recognition. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and possibility to develop very easy new features. Face recognition and machine vision applications in automatic inspection of various electronic modules can also be implemented using given algorithm.
Similar content being viewed by others
References
Islam MR, Siddiqa A, Uddin MP, Mandal AK, Hossain MD (2014) An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: 3rd Internationa conference on informatics, electronics ans vision, pp 1–6, May 23–24, Dhaka
Lita I, Visan DA, Cioc IB (2010) LabVIEW application for movement detection using image acquisition and processing.In: IEEE 16th international symposium ondesign and technology in electronic packaging (SIITME), pp 225–228
Kumar S, Yadav AK, Gupta A, Kumar P (2015) RGB image steganography on multiple frame video using LSB technique. In: International conference on computer and computational sciences (ICCCS), pp 226–231, January 26–27, Noida
Das R, Tuithung T (2012) A novel steganography method for image based on Huffman encoding. In: 3rd national conference on emerging trends and applications in computer science (NCETACS), pp 14–18, March 30–31, Shillong
Liu C (2014) The development trend of evaluating face-recognition technology. In: IEEE international conference on mechatronics and control (ICMC), pp 1540–1544
Teja GP, Ravi S (2012) Face recognition using subspaces techniques. In: IEEE international conference on recent trends in information technology (ICRTIT), pp 103–107
Horiuchi T, Hada T (2013) A complementary study for the evaluation of face recognition technology. In: IEEE 47th international Carnahan conference on security technology (ICCST), pp 1–5
Johnson G (1997) LabVIEW graphical programming, 2nd edn. TMH, New York
Jerome J (2010) Virtual Instrumentation using LabVIEW. 1st edn. PHI Learning Pvt. Ltd., New Delhi, India
Wang L, Shen Y (2010) Design of machine vision applications in detection of defects in high-speed bar copper.In: IEEE international conference on E-Product E-Service and E-Entertainment (ICEEE), pp 1–4
Laptev I, Wills J, Perez P, Belongie SJ (2005) Periodic motion detection and segmentation via approximate sequence alignment. IEEE Int Conf Comput Vision 1:816–823
Surekha P, Sumathi S (2007) LabVIEW based advance instrumentation, 1st edn. Springer, Berlin
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Verma, P.K., Kumar, A. Implementation of advanced steganography with higher security using LabVIEW. CSIT 4, 65–72 (2016). https://doi.org/10.1007/s40012-016-0122-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40012-016-0122-z