General Academic Projects

cancel
Showing results for 
Search instead for 
Did you mean: 

Image Steganography,INDIA

*Visit the official "Submit Entry" page to enter your NI LabVIEW student design project in the competition*


*Please add your country to the title of your project, example: Amazing Robot Project, Poland.

Contact Information

University:National Institute of Science and Technology

Team Member(s):Stita Pragyan Dandapat and Ashirbad Das

Faculty Advisors:Mr. Kunja Bihari Swain

Email Address:stita123@gmail.com

Country:INDIA

Project Information

Title:A new approach to Image Steganography by using the R,G and B values of the Image,INDIA
Description:

The aim of this project is to hide or embed a data image on a cover Image at the encoding level and  extract this data image from the cover image at the decoding level to enhance the cyber security

Products:

1) NI Labview 2011

2) NI Vision Acquisition Software 2011

3) NI Vision Development Module 2011

4) Any USB camera/other image capturing devices

The Challenge:

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. In this project a data image is to be hidden inside a cover Image at the sender's point and at the receiver's point that data image is to be extracted from the same cover image.

The Solution:

At the Encoding part first a data image is captured through a vision acquisition device(for experiment we took a usb camera) and the cover image is given through a file location, then the data image and cover image R,G and B values are extracted. After extraction of the R, G and B values of the cover image and data image,each R, G and B values of the data image is searched with the R, G and B values of the cover image and their index values are stored in an array and passed to Gobal variables that is to be used in Decoding part of our program along with the row and colum size of the data image.

NOTE:- As we are passing only the index arrays and the row and column size of the data image so it will be very difficult to a third party to get any imformation   about our data image and it will be secured.

FRONT PANEL:-

                                                                        Steganography__encodingp.png

BLOCK DIAGRAM:-

Steganography__encodingd.png


                                                                                                                                                       

At the Decoding part the cover image used is provided and its R,G and B values are extracted and then using the index array function the elements at each index present in the index arrays of R,G and B(got from the Encoding part of our program) are extracted and finally combined to get the Data Image.

FRONT PANEL:-

                                                                                Steganography__Decodingp.png

BLOCK DIAGRAM:-                                                                       

Steganography__Decodingd.png

GLOBAL VI USED IN BOTH ENCODING AND DECODING PART OF THE PROGRAM:-

                                                                                                             Gobal__Variablesgblp.png                                                                                                

APPLICATION:-

Image Steganography has many applications, especially in today’s modern, hightech world. Privacy and anonymity is a concern for most people on the internet.

Image Steganography allows for two parties to communicate secretly and covertly. It allows for some morally-conscious people to safely whistle blow on internal actions;

it allows for copyright protection on digital files using the message as a digital watermark. One of the other main uses for Image Steganography is for the transportation of high-level or top-secret documents between international governments.

USES:-

This technique can be used in satellites to transfer highly confidential image data to their workstation,can be used at military bases etc where data security is very much essential.

Nominate Your Professor: (optional)

<insert nomination. Does your professor use LabVIEW or other National Instruments technology to make learning difficult concepts engaging, interesting, and fun? If so, nominate him/her as an outstanding educator by telling us who they are, what they teach, and how they make learning a better experience for you.>

Comments
Member
Member
on

a good idea  being implemented in this  project....which is very much necessary now a days.......do lyk it....

Member
Member
on

good project

Member
Member
on

thanks.............

Member
Member
on

good 1..........

Member
Member
on

Thank U subham.....................

Member
Member
on

Nice work

Member
Member
on

Gud Project !!!!!!!

Member
Member
on

NICE JOB DUDE...!!!

Member
Member
on

it is too nice project...............

Member
Member
on

it is superb

Member
Member
on

nice project jiki

Member
Member
on

nice buddy keep going..... well done

Member
Member
on

good job jicky carry on and wish u all the best...

Member
Member
on

first extract the data in the form of matrix, by assigning color intensity or values for green, red and blue, find orthogonal(PCA) arrays parsing maximum number of data points possible. Capture any two the arrays with maximum variance, plot graph betwn those two arrays u ll get clusters, model the clusters using statistical Neural network modelling use the model in place of image. hehehehhehe very easy

Member
Member
on

kk next time i will try ..............................n thanks..........

Member
Member
on

Nice job zeeky.........

Member
Member
on

Good idea being implemented....................

Member
Member
on

jicky it is a very nice project...........good idea.......

Member
Member
on

sonu if u liked my project then plz click the like present at the bottom ri8 of my project submission...............

Member
Member
on

very nice project.... great work......Ashirbad and Stita.....

Member
Member
on

nice project. keep it up

Member
Member
on

Thank you amlan...........

Member
Member
on

Thank u Roshan

Member
Member
on

nice one...

Member
Member
on

looks interesting....................

Member
Member
on

superb dear.............keep it up

Member
Member
on

nice one...

Member
Member
on

nice..

Member
Member
on

looks interesting...

Member
Member
on

Oowoooooo ......quite interesting .......!!!!!!!!!! anyws superbly done...... kp it up ......!!!!!!!

Member
Member
on

good....keep it up.....

Member
Member
on

all the best good job

Member
Member
on

nice 1 Bro. keep it up & cnt..

Member
Member
on

nice project jiki with interesting concept

Member
Member
on

nice project my friend.........

Member
Member
on

nice project dear....unique one...

Member
Member
on

Member
Member
on

Keep up the good work.The project looks great ,and may you carry on with your journey 🙂

Member
Member
on

nice idea..keep it up..

Member
Member
on

gr88!!! work jiki...keep going all the bst...:)

Member
Member
on

Nice job buddy !!!!

Member
Member
on

looks interesting...

Member
Member
on

gud 1

Member
Member
on

G-One

Member
Member
on

Nicw work!! Best of luck!!

Member
Member
on

good one and i learn how to use global variable.

Active Participant
Active Participant
on

Great and simple ... Effective coding.

Member
Member
on

i am using labview version 10 so i cant open global variable.vi can anyone please save it as compactable for version 10 and please send me my email id is ansu.francis3@gmail.com

Member
Member
on

is any one tell me what is latest technology or algorithm is used for image steganography?

Member
Member
on

how did you create the global variables ?

Contributors