Full Paper View Go Back

Implementation of LSB Based Steganography Algorithms in FPGA

K. Nandhini1 , B. Gomathi2

Section:Research Paper, Product Type: Journal
Vol.6 , Issue.5 , pp.32-37, Oct-2018

Online published on Oct 31, 2018


Copyright © K. Nandhini, B. Gomathi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Nandhini, B. Gomathi, “Implementation of LSB Based Steganography Algorithms in FPGA,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.5, pp.32-37, 2018.

MLA Style Citation: K. Nandhini, B. Gomathi "Implementation of LSB Based Steganography Algorithms in FPGA." International Journal of Scientific Research in Network Security and Communication 6.5 (2018): 32-37.

APA Style Citation: K. Nandhini, B. Gomathi, (2018). Implementation of LSB Based Steganography Algorithms in FPGA. International Journal of Scientific Research in Network Security and Communication, 6(5), 32-37.

BibTex Style Citation:
@article{Nandhini_2018,
author = {K. Nandhini, B. Gomathi},
title = {Implementation of LSB Based Steganography Algorithms in FPGA},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {32-37},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=346},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=346
TI - Implementation of LSB Based Steganography Algorithms in FPGA
T2 - International Journal of Scientific Research in Network Security and Communication
AU - K. Nandhini, B. Gomathi
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 32-37
IS - 5
VL - 6
SN - 2347-2693
ER -

843 Views    434 Downloads    313 Downloads
  
  

Abstract :
Data hiding is one of the crucial techniques in network security. The word Steganography denotes hiding a confidential message (like audio, image, text, video) in a host signal (like Image, video) such that an onlooker cannot detect the existing content. In this paper data drubbing is takes place by the embedding modules that transmit the data and recovering data by extraction, with and without the concept of pipelining technique and it is realized using Xilinx device Virtex-V. A comparison for the pipelined and non-pipelined mode of data is done for parameter like timing constraints, delay, and memory usage. From the outcome, it is addressed that the data embedding using pipelining mode give better results in terms of very less embedding time compared to the non-pipelined mode. As this data hiding methodology using 4 LSB Steganography algorithm involves only simple operation, it is easy to implement as FPGA chip using Verilog HDL model Language.

Key-Words / Index Term :
Steganography, 4LSB, Xilinx device, Verilog HDL

References :
[1] Hussain M, Hussain M (2013),” A survey of image steganography Techniques” International journal of Science and Technology, Vol. 97, No 18, 2014 .
[2] Tseng YC, Chen YY and Pan HK,” A secure data hiding scheme for binary images”, IEEE Trans Commun, vol. 50, No. 8, 2002.
[3] Fan L, Gao T, Cao Y , “Improving the embedding efficiency of weight matrix-Based steganography for gray scale images”, Computer Electronics Engineering Computer, vol. 39, No. 3, 2013.
[4] Puja Mahajan, Prajakta Nimbalkar and Prtiksha Pawar,” Improved FPGA base X-Box Mapping of an image using Steganography Technique”, International Journal of computer Application (0975-8887), 2016.
[5] Mohd BJ, Abed S, Al-Hayajneh T and Alouneh S , “FPGA Hardware of the LSB Steganography method”, Computer,Information and Telecommunication Systems (CITS), Vol.54, No. 5, 2012.
[6] Fan L, Gao T and Yang Q, Cao Y , “An extended matrix Encoding algorithm for Steganography of high embedding efficiency”, Comput Electrical Engineering,vol.37, No. 6, 2011.
[7] Fan L, Gao T and Chang CC , “Mathematical analysis of extended matrix coding for steganography”, In: Sensor Network Security Technology and Privacy Communication System (SNS & PCS), 2013.
[8] K. Sathish Shet , A. R. Aswath, C. Hanumantharaju and Xiao-Zhi Gao,” Design and development of new reconfigurable architectures for LSB/Multi-bit Image Steganography System”, Springer Science + Buisness Media New York, 2016.
[9] E. A. Elshazly, Safey A. S. Abdelwahab,R. M. Fikry, S. M. Elaraby,O. Zahran and M. El- Kordy ,” FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain”,International Journal of Computer Applications vol. 145,no. 12, 2016.
[10] Amirtharajan R and Rayappan JBB ,” An intelligent chaotic embedding approach to enhance stego image quality”,Inform Science, vol. 193, pp. 115-124, June 2012.
[11] Bassam Jamil Mohd, Saed Abed, Thaier Al- Hayajneh and Sahel Alouneh, “FPGA Hardware of the LSB Steganography Method,” IEEE Transaction on consumer Electronics, vol. 978, no. 1, pp. 4673– 1550,2012.
[12] Mamta Juneja and Parvinder Singh Sandhu, , “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, vol. l 9, No:3, pp.405-424, 2013.
[13] Upadhyay HN and Rayappan JBB,” Survey and analysis of hardware cryptographic and steganographic systems on FPGA”,J Applied Science, vol. 12, No. 3, pp. 201–210, 2012.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation