BPCS Steganography for Data Security Using FPGA Implementation

被引:0
|
作者
Kait, Vikas S. [1 ]
Chauhan, Bina [1 ]
机构
[1] Savitribai Phule Univ Pune, Elect & Telecommun Dept, Moze Coll Engn, Pune, Maharashtra, India
关键词
Bit Plane; BPCS; Cover Image; Data Hiding; FPGA; Steganography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There are several techniques to conceal the secret information inside Cover objects; steganography is the one of them. Steganography is the art of invisible communication by concealing information inside other information. Images are the most popular cover objects for steganography. The BPCS steganography which stands for bit-plane complexity segmentation is the technique to hide secret information in some other data (carrier) with better visual imperceptibility. This technique uses the "noise-like" regions in the bit planes of the cover image to hide secret data without deteriorating the image quality. With this technique we can hide 50-60% of secrete data in the cover image. To embed the secret information inside images requires intensive computations, and therefore, the technique is implemented in an FPGA to increase the processing speed. This work presents a hardware implementation of bit-plane complexity segmentation (BPCS) steganography technique in Xilinx Spartan 3E FPGA family. To access the bit wise data on FPGA Baud rate can cause the delay.
引用
收藏
页码:1887 / 1891
页数:5
相关论文
共 50 条
  • [41] Securing IoT Data Using Steganography: A Practical Implementation Approach
    Djebbar, Fatiha
    ELECTRONICS, 2021, 10 (21)
  • [42] Implementation of Speech Signal for Promoting Global Cyber Security using Steganography Technique
    Sinha, Tilendra Shishir
    Sanyal, Gautam
    IETE TECHNICAL REVIEW, 2007, 24 (05) : 413 - 419
  • [43] Implementation of speech signal for promoting global cyber security using steganography technique
    NIT, Durgapur, India
    不详
    不详
    IETE Tech Rev, 2007, 5 (413-419):
  • [44] An efficient AES implementation using FPGA with enhanced security features
    Zodpe H.
    Sapkal A.
    Zodpe, Harshali (harshali.zodpe@mitpune.edu.in), 1600, King Saud University (32): : 115 - 122
  • [45] Topological ordered color table for BPCS-Steganography using indexed color images
    Ouellette, R
    Noda, H
    Niimi, M
    Kawaguchi, E
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 502 - 509
  • [46] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [47] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778
  • [48] Implementation of Dual Security through DSA and Audio Steganography
    Taneja, Natasha
    Gupta, Prinima
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1349 - 1352
  • [49] Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis
    Tan, Shunquan
    Huang, Jiwu
    Shi, Yun Q.
    DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 112 - +
  • [50] A New Information Hiding Method Based on Improved BPCS Steganography
    Sun, Shuliang
    ADVANCES IN MULTIMEDIA, 2015, 2015