BPCS Steganography for Data Security Using FPGA Implementation

被引:0
|
作者
Kait, Vikas S. [1 ]
Chauhan, Bina [1 ]
机构
[1] Savitribai Phule Univ Pune, Elect & Telecommun Dept, Moze Coll Engn, Pune, Maharashtra, India
关键词
Bit Plane; BPCS; Cover Image; Data Hiding; FPGA; Steganography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are several techniques to conceal the secret information inside Cover objects; steganography is the one of them. Steganography is the art of invisible communication by concealing information inside other information. Images are the most popular cover objects for steganography. The BPCS steganography which stands for bit-plane complexity segmentation is the technique to hide secret information in some other data (carrier) with better visual imperceptibility. This technique uses the "noise-like" regions in the bit planes of the cover image to hide secret data without deteriorating the image quality. With this technique we can hide 50-60% of secrete data in the cover image. To embed the secret information inside images requires intensive computations, and therefore, the technique is implemented in an FPGA to increase the processing speed. This work presents a hardware implementation of bit-plane complexity segmentation (BPCS) steganography technique in Xilinx Spartan 3E FPGA family. To access the bit wise data on FPGA Baud rate can cause the delay.
引用
收藏
页码:1887 / 1891
页数:5
相关论文
共 50 条
  • [1] JPEG Steganography Using BPCS
    Andrieux, Flavien
    Deltel, Clement
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 163 - 163
  • [2] Security Approach for LSB Steganography Based FPGA Implementation
    AlWatyan, Abdullah
    Mater, Wesam
    Almutairi, Omar
    Almutairi, Mohammed
    Al-Noori, Aisha
    Abed, Sa'ed
    2017 7TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION, AND APPLIED OPTIMIZATION (ICMSAO), 2017,
  • [3] An Automated Security Approach of Video Steganography-Based LSB Using FPGA Implementation
    Abed, Sa'ed
    Al-Mutairi, Mohammed
    Al-Watyan, Abdullah
    Al-Mutairi, Omar
    AlEnizy, Wesam
    Al-Noori, Aisha
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (05)
  • [4] STEGANOGRAPHY USING BPCS TO THE INTEGER WAVELET TRANSFORMED IMAGE
    Ramani, K.
    Prasad, E. V.
    Varadarajan, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 293 - +
  • [5] BPCS steganography using EZW lossy compressed images
    Spaulding, J
    Noda, H
    Shirazi, MN
    Kawaguchi, E
    PATTERN RECOGNITION LETTERS, 2002, 23 (13) : 1579 - 1587
  • [6] Reliable detection of BPCS steganography
    Wu, Jia
    Zhang, Ru
    Niu, Xin-Xin
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (04): : 113 - 116
  • [7] Novel steganalysis schemes for BPCS steganography
    Lou, D. -C.
    Lin, C. -L.
    Liu, C. -L.
    IMAGING SCIENCE JOURNAL, 2008, 56 (04): : 232 - 242
  • [8] Implementation of advanced steganography with higher security using LabVIEW
    P. K. Verma
    Amit Kumar
    CSI Transactions on ICT, 2016, 4 (2-4) : 65 - 72
  • [9] An Unique Data Security using Text Steganography
    Torvi, Savitha D.
    ShivaKumar, K. B.
    Dash, Rupam
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3834 - 3838
  • [10] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397