Loading

Implementation of Video Encryption using Hill Cipher in Labview
K. Gnana Sushma1, BVSSN Raju2

1K. Gnana Sushma, Department of Electrical & Electronic Engineering, SRKR Engineering College, Bhimavaram (Andhra Pradesh), India.
2B.V.S.S.N. Raju, Department of Electrical & Electronic Engineering, SRKR Engineering College, Bhimavaram (Andhra Pradesh), India.
Manuscript received on 11 May 2019 | Revised Manuscript received on 05 June 2019 | Manuscript Published on 15 June 2019 | PP: 141-145 | Volume-8 Issue-1S3 June 2019 | Retrieval Number: A10260681S319/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The video encryption is necessary to protect the information from unauthorized viewing, sharing, data breaching and theft. This paper presents video file encryption implementation in LabVIEW. Hill cipher technique is used to encrypt the video file with an asymmetric encryption. The encryption key is different from the key used for decryption since it is an asymmetric encryption. The LabVIEW Vision Acquisition Software is used to obtain images continuously and then save them to a file in AVI format. The video file is opened using IMAQ open AVI VI (Virtual Instrument) and it is separated into frames. The encryption is applied on each frame such that they convey no visual information about the original frame. The encrypted frames are combined together to form an encrypted video and then it is saved to a file. The encrypted video file can be transferred to an email from LabVIEW using Simple Mail Transfer Protocol (SMTP). If any error occurs during transmission an error message is popped. To access the original video, decryption key is applied on the encrypted video.
Keywords: Video File Encryption, Hill Cipher, Asymmetric Encryption, SMTP, LabVIEW.
Scope of the Article: Encryption Methods and Tools