Skip to main content
Log in

Implementation of advanced steganography with higher security using LabVIEW

  • Special Issue REDSET 2016 of CSIT
  • Published:
CSI Transactions on ICT Aims and scope Submit manuscript

Abstract

This paper presents the implementation of a highly secured data hiding technique called Steganography. This technique is applicable for image data type. The goal is to encode the data image within the cover image such that the data image’s existence is concealed. Cover media for image based steganography is image. Steganography deals with encoding data image information in a given image (called cover image) without making any visible changes to it. For advance security face recognition technique is used, so that only authorized person can access the data image. In this system dual security is provide first is encoding of data image in cover image and second is face recognition. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and possibility to develop very easy new features. Face recognition and machine vision applications in automatic inspection of various electronic modules can also be implemented using given algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Islam MR, Siddiqa A, Uddin MP, Mandal AK, Hossain MD (2014) An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: 3rd Internationa conference on informatics, electronics ans vision, pp 1–6, May 23–24, Dhaka

  2. Lita I, Visan DA, Cioc IB (2010) LabVIEW application for movement detection using image acquisition and processing.In: IEEE 16th international symposium ondesign and technology in electronic packaging (SIITME), pp 225–228

  3. Kumar S, Yadav AK, Gupta A, Kumar P (2015) RGB image steganography on multiple frame video using LSB technique. In: International conference on computer and computational sciences (ICCCS), pp 226–231, January 26–27, Noida

  4. Das R, Tuithung T (2012) A novel steganography method for image based on Huffman encoding. In: 3rd national conference on emerging trends and applications in computer science (NCETACS), pp 14–18, March 30–31, Shillong

  5. Liu C (2014) The development trend of evaluating face-recognition technology. In: IEEE international conference on mechatronics and control (ICMC), pp 1540–1544

  6. Teja GP, Ravi S (2012) Face recognition using subspaces techniques. In: IEEE international conference on recent trends in information technology (ICRTIT), pp 103–107

  7. Horiuchi T, Hada T (2013) A complementary study for the evaluation of face recognition technology. In: IEEE 47th international Carnahan conference on security technology (ICCST), pp 1–5

  8. Johnson G (1997) LabVIEW graphical programming, 2nd edn. TMH, New York

    Google Scholar 

  9. Jerome J (2010) Virtual Instrumentation using LabVIEW. 1st edn. PHI Learning Pvt. Ltd., New Delhi, India

  10. Wang L, Shen Y (2010) Design of machine vision applications in detection of defects in high-speed bar copper.In: IEEE international conference on E-Product E-Service and E-Entertainment (ICEEE), pp 1–4

  11. Laptev I, Wills J, Perez P, Belongie SJ (2005) Periodic motion detection and segmentation via approximate sequence alignment. IEEE Int Conf Comput Vision 1:816–823

    Google Scholar 

  12. Surekha P, Sumathi S (2007) LabVIEW based advance instrumentation, 1st edn. Springer, Berlin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. K. Verma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, P.K., Kumar, A. Implementation of advanced steganography with higher security using LabVIEW. CSIT 4, 65–72 (2016). https://doi.org/10.1007/s40012-016-0122-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40012-016-0122-z

Keywords

Navigation