High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

LabVIEW Based Multi Image Encryption and Decryption Algorithm for Security and Data Authentication

Author(s):

Jayshree Verma , SHRI SHANKRACHARYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, BHILAI; Dr. Monisha Sharma, SHRI SHANKRACHARYA TECHNICAL CAMPUS, BHILAI

Keywords:

RT Image, Inverse Wavelets Transform. Labview, NI-Vision & Advanced Signal Processing Tools, IMAQ Vision

Abstract

The sudden increase in encryption/decryption technology interest is most likely due to the increase in concern over copyright protection of multimedia content. With the rapid growth of the Internet and the multimedia image security systems in distributed environments encryption technique in multi images is a technique used to hide data or identifying information within the digital multimedia image. In the early days, encryption and decryption control access techniques were used to protect the image of media. Advance encryption algorithm technique becoming popular, especially for adding undetectable identification marks, such as copyright information. Because of this practical importance, watermarking techniques are often evaluated based on their invisibility, recoverability, and robustness. In this paper, the real-time image has been captured from the external device, in this work laptop from a camera (cam 0) has used for input of image to be encryption in interleave (JPG) format has taken, which is then converted into the number of frames. Each frame of the multi-image is then embedded with an algorithmic key using wavelet function. In this method, the level of WT can be easily controlled. Multi-resolution analysis has been performed on encrypted images and peak signal to noise ratio (PSNR) and mean square error (MSE) values have taken out to get the performance to differentiate between encrypted image and decryption image find out the accuracy and quality of image which actually depicts the efficiency and performance of AEC algorithm technique and the results of these has compared to one of the existing technique.

Other Details

Paper ID: IJSRDV6I120044
Published in: Volume : 6, Issue : 12
Publication Date: 01/03/2019
Page(s): 45-50

Article Preview

Download Article