FPGA Implementation of a Novel Image Steganography for Hiding Images

09/15/2016
by   Masoom Nazari, et al.
0

As the complexity of current data flow systems and according infrastructure networks increases, the security of data transition through such platforms becomes more important. Thus, different areas of steganography turn to one of the most challengeable topics of current researches. In this paper a novel method is presented to hide an image into the host image and Hardware/Software design is proposed to implement our stagenography system on FPGA- DE2 70 Altera board. The size of the secret image is quadrant of the host image. Host image works as a cipher key to completely distort and encrypt the secret image using XOR operand. Each pixel of the secret image is composed of 8 bits (4 bit-pair) in which each bit-pair is distorted by XORing it with two LSB bits of the host image and putting the results in the location of two LSB bits of host image. The experimental results show the effectiveness of the proposed method compared to the most recently proposed algorithms by considering that the obtained information entropy for encrypt image is approximately equal to 8.

READ FULL TEXT
research
02/01/2022

A Novel Pair and Matching Algorithm for Embedding Secret Messages in Images

Steganography has proven to be one of the practical way of securing data...
research
01/12/2010

A New Image Steganography Based On First Component Alteration Technique

In this paper, A new image steganography scheme is proposed which is a k...
research
09/20/2017

A new adaptive method for hiding data in images

LSB method is one of the well-known steganography methods which hides th...
research
09/25/2020

A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem

Reversible data hiding in encrypted domain (RDH-ED) schemes based on sym...
research
08/28/2019

A steganographic approach based on the chaotic fractional map and in the DCT domain

A steganographic method based on the chaotic fractional map and in the D...
research
04/27/2018

Resonance-based Secure Pairing for Wearables

Securely pairing wearables with another device is the key to many promis...
research
03/30/2018

A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation

In this paper, a robust and blind watermarking method is proposed, which...

Please sign up or login with your details

Forgot password? Click here to reset