A Comparative Analysis in Hardware Partitioning of a Steganographic based LSB-substitution Algorithm
نویسندگان
چکیده
Steganography is an amalgamation of art and science complimenting each other where the embedding or hiding of information is done in a digital image. This paper presents a logic level design synthesis (RTL) and IC design is done in Synopsys to visualize the implementation of LSB substitution steganographic algorithm based on 8 bit images, using HDL. This paper intends to visualize and compare the logic level design implementation of a steganographic algorithm as a standalone independent IC or as sub functioning block in a microprocessor (IP block) and conclude on the best possible method to implement steganography in hardware.
منابع مشابه
A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain
This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...
متن کاملA Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique
Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network...
متن کاملA New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB
Steganographic techniques can be utilized to conceal data within digital images with small or invisible changes in the perceived appearance of the image. Generally, five main objectives are used to assess the performance of steganographic algorithms which include embedding capacity, imperceptibility, security, robustness and complexity. However, steganographic algorithms hardly take all of thes...
متن کاملEigenvalues-based LSB steganalysis
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...
متن کاملPerformance Analysis of IoT Security scheme employing an Integrated Approach of Cryptography and Steganography
Internet of Things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors interconnected to facilitate speedy information and data exchange under soft real time constraints. IoT extends the ‘anywhere, anyhow, anytime‘ computing and networking paradigm to ‘anything, anyone and any service‘. In this paper, a security scheme in IoT is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014