Wavelet-transform steganography: Algorithm and hardware implementation
BJ Mohd, T Hayajneh… - International Journal of …, 2013 - inderscienceonline.com
Steganography is a powerful method to conceal the existence of secret data inside a cover
object. The concealment steps are performed in the spatial domain and/or the transform …
object. The concealment steps are performed in the spatial domain and/or the transform …
A comparative study of steganography designs based on multiple FPGA platforms
BJ Mohd, T Hayajneh, ZA Khalaf… - … Journal of Electronic …, 2016 - inderscienceonline.com
Steganography methods conceal covert messages inside communicated data. Field-
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …
Analysis and modeling of FPGA implementations of spatial steganography methods
Steganography has become an important method for concealed communication especially
through image files. Recent proposed steganographic methods employ multiple levels of …
through image files. Recent proposed steganographic methods employ multiple levels of …
Hide and seek in silicon–Performance analysis of Quad block Equisum Hardware Steganographic systems
S Rajagopalan, S Janakiraman, HN Upadhyay… - Procedia …, 2012 - Elsevier
Steganography has become a predominantly employed information security technique in
this modern era. Although the software methods which work on spatial as well as transform …
this modern era. Although the software methods which work on spatial as well as transform …
[PDF][PDF] Stego system on chip with LFSR based information hiding approach
R Sundararaman, HN Upadhyay - International Journal of …, 2011 - researchgate.net
This paper discusses about implementation of image steganographic system on Field
Programmable Gate Array and the information hiding techniques in various images that are …
Programmable Gate Array and the information hiding techniques in various images that are …
Novel algorithm and architectures for high-speed low-power ConText-based steganography
S Timarchi, MA Alaei… - 2017 19th International …, 2017 - ieeexplore.ieee.org
Least Significant Bit (LSB) insertion method is a popular type of steganographic algorithms
in spatial domain. Nevertheless, in this approach essential measures should be considered …
in spatial domain. Nevertheless, in this approach essential measures should be considered …
Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach
This paper attempts to give a hardware based practical overview about cheating prevention
of information hiding technique using Steganography and Visual Cryptographic Schemes …
of information hiding technique using Steganography and Visual Cryptographic Schemes …
A review on hardware implementation of steganography
S Debnath, M Kalita, S Majumder - 2017 Devices for Integrated …, 2017 - ieeexplore.ieee.org
Steganography deals with embedding secret data within inoffensive looking objects called
“Cover Objects.” To accomplish this, intensive computations are required to be performed …
“Cover Objects.” To accomplish this, intensive computations are required to be performed …
[引用][C] Stego on song-an amalgam of VI and FPGA for hardware info hide
S Rajagopalan, K Pravallika… - Information …, 2014 - Asian Network for Scientific …