A Comparative Analysis in Hardware Partitioning of a Steganographic based LSB-substitution Algorithm

نویسندگان

  • Shyam Sumukh S R
  • Raghav Gupta
  • Jagadish Nayak
چکیده

Steganography is an amalgamation of art and science complimenting each other where the embedding or hiding of information is done in a digital image. This paper presents a logic level design synthesis (RTL) and IC design is done in Synopsys to visualize the implementation of LSB substitution steganographic algorithm based on 8 bit images, using HDL. This paper intends to visualize and compare the logic level design implementation of a steganographic algorithm as a standalone independent IC or as sub functioning block in a microprocessor (IP block) and conclude on the best possible method to implement steganography in hardware.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network...

متن کامل

A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB

Steganographic techniques can be utilized to conceal data within digital images with small or invisible changes in the perceived appearance of the image. Generally, five main objectives are used to assess the performance of steganographic algorithms which include embedding capacity, imperceptibility, security, robustness and complexity. However, steganographic algorithms hardly take all of thes...

متن کامل

Eigenvalues-based LSB steganalysis

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

متن کامل

Performance Analysis of IoT Security scheme employing an Integrated Approach of Cryptography and Steganography

Internet of Things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors interconnected to facilitate speedy information and data exchange under soft real time constraints. IoT extends the ‘anywhere, anyhow, anytime‘ computing and networking paradigm to ‘anything, anyone and any service‘. In this paper, a security scheme in IoT is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014