BPCS Steganography for Data Security Using FPGA Implementation

被引:0
|
作者
Kait, Vikas S. [1 ]
Chauhan, Bina [1 ]
机构
[1] Savitribai Phule Univ Pune, Elect & Telecommun Dept, Moze Coll Engn, Pune, Maharashtra, India
来源
2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2015年
关键词
Bit Plane; BPCS; Cover Image; Data Hiding; FPGA; Steganography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are several techniques to conceal the secret information inside Cover objects; steganography is the one of them. Steganography is the art of invisible communication by concealing information inside other information. Images are the most popular cover objects for steganography. The BPCS steganography which stands for bit-plane complexity segmentation is the technique to hide secret information in some other data (carrier) with better visual imperceptibility. This technique uses the "noise-like" regions in the bit planes of the cover image to hide secret data without deteriorating the image quality. With this technique we can hide 50-60% of secrete data in the cover image. To embed the secret information inside images requires intensive computations, and therefore, the technique is implemented in an FPGA to increase the processing speed. This work presents a hardware implementation of bit-plane complexity segmentation (BPCS) steganography technique in Xilinx Spartan 3E FPGA family. To access the bit wise data on FPGA Baud rate can cause the delay.
引用
收藏
页码:1887 / 1891
页数:5
相关论文
共 50 条
  • [31] A technique of improved steganography text based on chaos and BPCS
    Shi, Peipei
    Li, Zhaohui
    Zhang, Tao
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 232 - 236
  • [32] Enhancing Data Security in video Steganography using Face Recognition
    Patil, Alaknanda S.
    Sundari, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 134 - 144
  • [33] Using Image Steganography for Providing Enhanced Medical Data security
    Usmani, Muhammad Arslan
    Usman, Muhammad Rehan
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [34] Carrier Data Security using Public Key Steganography in ZigBee
    Hussain, Iqra
    Pandey, Nitin
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 214 - 217
  • [35] Data Security Using Extended ECS (Encryption, Compression, Steganography)
    Verma, Surbhi
    Kaur, Gagandeep
    Garg, Deepak
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 816 - 826
  • [36] Enhancing Data Security Using Steganography in Spatial Domain Images
    Wahono, Dimas
    Rahman, Hilmy
    Syarif, Hisyam
    De La Croix, Ntivuguruzwa Jean
    Ahmad, Tohari
    2nd International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2024, 2024,
  • [37] FPGA Implementation of Biological Feature Based Steganography Method
    Peroumal, Vijayakumar
    Harishankar, R.
    Ramesh, R.
    Rajashree, R.
    BIOMEDICAL ENGINEERING SCIENCE AND TECHNOLOGY, ICBEST 2023, 2024, 2003 : 336 - 348
  • [38] FPGA BASED IMPLEMENTATION OF A NOVEL IMAGE STEGANOGRAPHY ALGORITHM
    Lighvan, Mina Zolfy
    Nazari, Masoom
    Dinevari, Vahid
    Koozehkonani, Ziaeddin Daie
    Khosroshahi, Ghader Karimian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON INTERFACES AND HUMAN COMPUTER INTERACTION 2015, GAME AND ENTERTAINMENT TECHNOLOGIES 2015 AND COMPUTER GRAPHICS, VISUALIZATION, COMPUTER VISION AND IMAGE PROCESSING 2015, 2015, : 203 - 210
  • [39] A study on visual attack to BPCS-steganography and countermeasure
    Niimi, Michiharu
    Noda, Hideki
    Segee, Bruce
    VISUAL CONTENT PROCESSING AND REPRESENTATION, 2006, 3893 : 29 - 36
  • [40] Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography
    Amalarethinam, D. I. George
    FathimaMary, B.
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 181 - 184