scispace - formally typeset
Open AccessJournal ArticleDOI

FPGA Implementation of Hiding Information using Cryptography

TLDR
This work implements a mechanism to hide information (image) using cryptography by giving image input to AES encryption system and getting the decrypted image as original image by giving encrypted image as input to the AES decryption system.
Abstract
Background: The main threat in communication is the unauthorized access of information third party without the knowledge of sender and receiver. Hence the security plays a vital role in data transmission systems. Confidential data like internet banking account passwords and email account passwords needs security in their text data. Data can be text, image, video and audio. Methods: The purpose of this research work is to implement a mechanism to hide information (image) using cryptography. Advanced Encryption Standard (AES) is a type of symmetric cryptography standard which can be used to transfer a block of information securely during transmission. Findings: The idea of this paper is to generate an encrypted image by giving image input to AES encryption system and getting the decrypted image as original image by giving encrypted image as input to the AES decryption system. The input image is given through MATLAB R2012b to ModelSim6.3 and the system simulation and synthesis is done by integrating Model Sim to the Altera DE2 115 board through Quartus II software. Conclusion: The maximum frequency attained from this workis 165.462MHz. Finally image is displayed through an LCD which is connected to the board using Video Graphics Array (VGA) Connector.

read more

Citations
More filters
Journal ArticleDOI

A combined watermarking approach for securing biometric data

TL;DR: A new watermarking reinforcement approach that ensures a suitable compromise between the security level of a person's biometric data and the computational complexity of the proposed scheme while maintaining a reduced storage space and a good visual quality of the watermarked host image is proposed.
Journal ArticleDOI

Performance Evaluation of Encryption/Decryption Mechanisms to Enhance Data Security

TL;DR: An algorithm which is established on the ASCII value to encode a plaintext is proposed and modified to one other key via substitution of position of key utilizing a random number and is used to decode decrypt the message of original plaintext.
Journal ArticleDOI

An Extensive Survey of Data Hiding Techniques

TL;DR: Different data hiding methods termed as watermarking, cryptography and steganography which have been proposed in last few years are enlighten, some of them are flexible and simple for data hiding purpose and the potency is based on certain features like robustness, imperceptibility and data embedding capacity.
Journal ArticleDOI

Enhancing the Message Authentication Process in VANET under High Traffic Condition using the PBAS Approach

TL;DR: The Elliptic Curve Cryptography Algorithm (ECC) approach which uses the vehicle ID, a random generated prime number and time stamp to encrypt the message in a secure manner is discussed which provides high quality of message authentications in less time period.
Journal ArticleDOI

Embedding QR Code in the Wavelet Domain of Image for Metadata Hiding

TL;DR: A method for inserting the QR code in the CIEXYZ color space to store metadata information and indicates that the proposed method provides unambiguous detection, imperceptibility, security, and robustness against JPEG compression, median filtering, different noise and image cropping attacks.
References
More filters
Journal ArticleDOI

FPGA implementation and performance evaluation of a high throughput crypto coprocessor

TL;DR: The FPGA implementation of FastCrypto, which extends a general-purpose processor with a crypto coprocessor for encrypting/decrypting data, is described and the trade-offs between Fastcrypto performance and design parameters are studied, including the number of stages per round, thenumber of parallel Advance Encryption Standard (AES) pipelines, and the size of the queues.

Simulation of Image Encryption using AES Algorithm

TL;DR: The design of a 128 bit encoder using AES Rijndael Algorithm for image encryption using optimized and Synthesizable VHDL code is developed for the implementation of 128- bit data encryption and process.
Journal ArticleDOI

Secure image encryption using aes

TL;DR: This paper presents an application of AES (Advanced Encryption Standard) operations in image encryption and decryption, and shows how the encrypted cipher images always display the uniformly distributed RGB pixels.
Journal Article

Image Processing using IP Core Generator through FPGA

TL;DR: Xilinx CORE Generator System generates and delivers parameterizable cores optimized for Xilinx FPGAs, and provides a flexible Block Memory Generator core to create compact, high-performance memories running at up to 450 MHz.

Encryption and Decryption of Text using AES Algorithm

TL;DR: A design of effective security for data communication by AES algorithm for encryption and decryption by specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998 is described.
Related Papers (5)