Multiple layer text security using variable block size cryptography and image steganography

S Chauhan, J Kumar, A Doegar - 2017 3rd International …, 2017 - ieeexplore.ieee.org
Information security is the major concern now a day since number of internet users is
increasing and secret information is getting shared every second. This has also hiked the …

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation

BJ Mohd, T Hayajneh, ZA Khalaf… - Security and …, 2016 - Wiley Online Library
The growth of low‐resource devices has increased rapidly in recent years. Communication
in such devices presents two challenges: security and resource limitation. Lightweight …

Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system

K Sathish Shet, AR Aswath… - Multimedia Tools and …, 2017 - Springer
The most crucial task in real-time processing of steganography algorithms is to reduce the
computational delay and increase the throughput of a system. This critical issue is effectively …

An automated security approach of video steganography–based lsb using fpga implementation

S Abed, M Al-Mutairi, A Al-Watyan… - Journal of circuits …, 2019 - World Scientific
Steganography has become one of the most significant techniques to conceal secret data in
media files. This paper proposes a novel automated methodology of achieving two levels of …

Novel chaotic random memory indexing steganography on FPGA

SM Ismail, AM Ghidan, PW Zaki - AEU-International Journal of Electronics …, 2020 - Elsevier
Data security has been a major concern for all means of communication lately. As
Steganography offers such a unique form of securing data, in this paper, two novel image …

Software and hardware-based audio-video crypto steganalysis model for enhancing robustness and imperceptibility of secured data

SK Moon - Multimedia Tools and Applications, 2022 - Springer
Nowadays for the privacy and security of secret data, information like audio, signature,
thumb, voice, and fingerprints are the most emerging parameters and hence its …

[PDF][PDF] Enhanced data hiding capacity using LSB-based image steganography method

H Gupta, R Kumar, S Changlani - International Journal of Emerging …, 2013 - Citeseer
Steganography is one of the most powerful techniques to conceal the existence of hidden
secret data inside a cover object. Images are the most popular cover objects for …

Stego on FPGA: an IWT approach

B Ramalingam, R Amirtharajan… - The Scientific World …, 2014 - Wiley Online Library
A reconfigurable hardware architecture for the implementation of integer wavelet transform
(IWT) based adaptive random image steganography algorithm is proposed. The Haar‐IWT …

Wavelet-transform steganography: Algorithm and hardware implementation

BJ Mohd, T Hayajneh… - International Journal of …, 2013 - inderscienceonline.com
Steganography is a powerful method to conceal the existence of secret data inside a cover
object. The concealment steps are performed in the spatial domain and/or the transform …

A comparative study of steganography designs based on multiple FPGA platforms

BJ Mohd, T Hayajneh, ZA Khalaf… - … Journal of Electronic …, 2016 - inderscienceonline.com
Steganography methods conceal covert messages inside communicated data. Field-
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …