Wavelet-transform steganography: Algorithm and hardware implementation

BJ Mohd, T Hayajneh… - International Journal of …, 2013 - inderscienceonline.com
Steganography is a powerful method to conceal the existence of secret data inside a cover
object. The concealment steps are performed in the spatial domain and/or the transform …

A comparative study of steganography designs based on multiple FPGA platforms

BJ Mohd, T Hayajneh, ZA Khalaf… - … Journal of Electronic …, 2016 - inderscienceonline.com
Steganography methods conceal covert messages inside communicated data. Field-
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …

Analysis and modeling of FPGA implementations of spatial steganography methods

BJ Mohd, T Hayajneh, S Abed… - Journal of Circuits, Systems …, 2014 - World Scientific
Steganography has become an important method for concealed communication especially
through image files. Recent proposed steganographic methods employ multiple levels of …

Hide and seek in silicon–Performance analysis of Quad block Equisum Hardware Steganographic systems

S Rajagopalan, S Janakiraman, HN Upadhyay… - Procedia …, 2012 - Elsevier
Steganography has become a predominantly employed information security technique in
this modern era. Although the software methods which work on spatial as well as transform …

[PDF][PDF] Stego system on chip with LFSR based information hiding approach

R Sundararaman, HN Upadhyay - International Journal of …, 2011 - researchgate.net
This paper discusses about implementation of image steganographic system on Field
Programmable Gate Array and the information hiding techniques in various images that are …

Novel algorithm and architectures for high-speed low-power ConText-based steganography

S Timarchi, MA Alaei… - 2017 19th International …, 2017 - ieeexplore.ieee.org
Least Significant Bit (LSB) insertion method is a popular type of steganographic algorithms
in spatial domain. Nevertheless, in this approach essential measures should be considered …

Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach

B Jana, SK Mondal, S Jana… - … Conference on Issues and …, 2014 - ieeexplore.ieee.org
This paper attempts to give a hardware based practical overview about cheating prevention
of information hiding technique using Steganography and Visual Cryptographic Schemes …

A review on hardware implementation of steganography

S Debnath, M Kalita, S Majumder - 2017 Devices for Integrated …, 2017 - ieeexplore.ieee.org
Steganography deals with embedding secret data within inoffensive looking objects called
“Cover Objects.” To accomplish this, intensive computations are required to be performed …

[引用][C] Stego on song-an amalgam of VI and FPGA for hardware info hide

S Rajagopalan, K Pravallika… - Information …, 2014 - Asian Network for Scientific …

[引用][C] R. Sundararaman