scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

FPGA implementation of data hididng in grayscale imagesusing neighbour mean interpolation

01 Feb 2015-pp 1124-1127
TL;DR: A new VLSI architecture for data hiding in grayscale images using neighbour mean image interpolation technique, as this mechanism will have a minimum computation complexity.
Abstract: Data hiding in one of the easiest technique to authenticate and resolve the copyright issues of multimedia data. This paper proposes a new VLSI architecture for data hiding in grayscale images using neighbour mean image interpolation technique, as this mechanism will have a minimum computation complexity. In this VLSI based data hiding process the secret digital signature is hidden in the host image and analyzed with the PSNR value and Payload capacity.
Citations
More filters
Journal ArticleDOI
TL;DR: Experimental results confirm that the conceal capacity measured by bit per pixel (bpp), security of hiddensecret data, very good visual recovery of both original and secret data, Cross-Correlation (CC) and Peak Signal to Noise Ratio (PSNR) values are better than existing approaches.
Abstract: As today’s world are switching to the digital media through the Internet and multimedia tools like Facebook, YouTube, Twitter and WhatsApp which consists of a number of videos, hence it always better to take urgent problems of such digitally transmitted video in terms of information security. The current video steganography approach is not so effective for imperceptibility, robustness, security of hidden secret data, embedding capacity and very good visual recovery of a secret as well as original data. Hence, to maintain the balance between these issues is another big challenge. This work employs a novel and efficient Field Programmable Gate Array (FPGA) implementation of audio, video crypto steganography using General Modified Secured Diamond Encoding (GMSDE) scheme. The new proposed scheme is based on Diamond Encoding (DE), Exploiting Modification Direction (EMD) and Adaptive Pixel Pairing Matching (APPM) algorithms called as General Modified Secured Diamond Encoding (GMSDE). The DE method is always used for k > 1 which produces distortion, less embedding capacity and security of hidden data. The GMSDE scheme changed the Diamond Characteristic Value (DCV) to conceal more than one secret bit vertically and horizontally to create a modified diamond shape of secret data which is equal to log2(2x2 + 6x + 5) - ary and produces the conceal capacity of 1.16 to 4.82 bpp for the values of x = 0 to 25 where x is the embedding parameter. Experimental results confirm that the conceal capacity measured by bit per pixel (bpp), security of hidden secret data, very good visual recovery of both original and secret data, Cross-Correlation (CC) and Peak Signal to Noise Ratio (PSNR) values are better than existing approaches. Further through many attacks on stego video during transmission using forensic detection approach, the imperceptibility, security of hidden data and robustness is increased for secure communication.

3 citations

Proceedings ArticleDOI
23 Mar 2017
TL;DR: An overview of the hardware platforms is given and several works done in implementing steganographic algorithms in hardware mainly in the FPGA-based spatial domain are discussed.
Abstract: Steganography deals with embedding secret data within inoffensive looking objects called “Cover Objects.” To accomplish this, intensive computations are required to be performed. Modern day steganography can be implemented using both software and hardware for the purpose of obscurity based security or Kerckhoffs's principle based Shannon's maxim. The algorithm used in both the implementations may be in spatial or transform domain. Moreover, hardware implementations may be done via a lot of variants among which FPGA (Field Gate Programmable Array) based implementations are most user-friendly and easy to implement and reconfigure. Hardware implementation speeds up the embedding process where as transform domain increases robustness. But the complexity of transform domain is huge compared to the spatial domain. So the simple and fast FPGA-based spatial domain real time hardware implementation of steganography becomes an important field to explore. This paper gives an overview of the hardware platforms and discusses several works done in implementing steganographic algorithms in hardware mainly in the FPGA-based spatial domain.

2 citations

References
More filters
Journal ArticleDOI
01 Jul 1999
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

2,561 citations


"FPGA implementation of data hididng..." refers background in this paper

  • ...The multimedia data can be an image, audio and video etc [4,5]....

    [...]

Book
23 Nov 2007
TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract: Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

1,773 citations


"FPGA implementation of data hididng..." refers background in this paper

  • ...INTRODUCTION Nowadays the transmission and sharing of multimedia data contents over wireless networks and internet are growing insecure due to illegal reproduction and alteration of the contents [1]....

    [...]

Journal ArticleDOI
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Abstract: In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.

1,270 citations


"FPGA implementation of data hididng..." refers background in this paper

  • ...The multimedia data can be an image, audio and video etc [4,5]....

    [...]

Journal ArticleDOI

1,220 citations

Journal ArticleDOI
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Abstract: Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spycraft family: cryptography scrambles a message so it cannot be understood while steganography hides the message so it cannot be seen. In this article the authors discuss image files and how to hide information in them, and discuss results obtained from evaluating available steganographic software. They argue that steganography by itself does not ensure secrecy, but neither does simple encryption. If these methods are combined, however, stronger encryption methods result. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. But with steganography, the interceptor may not know that a hidden message even exists. For a brief look at how steganography evolved, there is included a sidebar titled "Steganography: Some History."

644 citations