[PDF][PDF] Survey and analysis of hardware cryptographic and steganographic systems on FPGA
Little brooks make great rivers-says a proverb. Information science involves not only the
efforts made for gathering, acquiring or collecting the data that corresponds to the …
efforts made for gathering, acquiring or collecting the data that corresponds to the …
Wavelet-transform steganography: Algorithm and hardware implementation
Steganography is a powerful method to conceal the existence of secret data inside a cover
object. The concealment steps are performed in the spatial domain and/or the transform …
object. The concealment steps are performed in the spatial domain and/or the transform …
Analysis and modeling of FPGA implementations of spatial steganography methods
Steganography has become an important method for concealed communication especially
through image files. Recent proposed steganographic methods employ multiple levels of …
through image files. Recent proposed steganographic methods employ multiple levels of …
Hide and seek in silicon–Performance analysis of Quad block Equisum Hardware Steganographic systems
Steganography has become a predominantly employed information security technique in
this modern era. Although the software methods which work on spatial as well as transform …
this modern era. Although the software methods which work on spatial as well as transform …
A comparative study of steganography designs based on multiple FPGA platforms
Steganography methods conceal covert messages inside communicated data. Field-
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …
[PDF][PDF] MSB based embedding with integrity: An adaptive RGB Stego on FPGA platform
S Rajagopalan, PJS Prabhakar… - Information …, 2014 - researchgate.net
Information hiding as a field is extremely fast develo** and one of the very few fields that
derive its power from its inherent need for sophistication and complexity in its algorithms. Out …
derive its power from its inherent need for sophistication and complexity in its algorithms. Out …
Novel algorithm and architectures for high-speed low-power ConText-based steganography
Least Significant Bit (LSB) insertion method is a popular type of steganographic algorithms
in spatial domain. Nevertheless, in this approach essential measures should be considered …
in spatial domain. Nevertheless, in this approach essential measures should be considered …
Crypto‐Stego‐Real‐Time (CSRT) System for Secure Reversible Data Hiding
L Desai, S Mali - VLSI Design, 2018 - Wiley Online Library
Due to demand of information transfer through higher speed wireless communication
network, it is time to think about security of important information to be transferred. Further …
network, it is time to think about security of important information to be transferred. Further …
Image digital watermarking based on a novel clock-controlled generator
E Bai, Y Yang, X Jiang - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
Based on the m-sequence on finite field GF (2), a novel clock-controlled generator (NCCG)
has been proposed by combining the shrinking generator and the self-shrinking generator …
has been proposed by combining the shrinking generator and the self-shrinking generator …
Multiplexed stego path on reconfigurable hardware: A novel random approach
Abstract Information security, though having different areas of interest, is fairly specific and
confined to secure digital data transmission. Currently, there are many data security …
confined to secure digital data transmission. Currently, there are many data security …