[PDF][PDF] Survey and analysis of hardware cryptographic and steganographic systems on FPGA

S Rajagopalan, R Amirtharajan… - Journal of Applied …, 2012 - researchgate.net
Little brooks make great rivers-says a proverb. Information science involves not only the
efforts made for gathering, acquiring or collecting the data that corresponds to the …

Wavelet-transform steganography: Algorithm and hardware implementation

BJ Mohd, T Hayajneh… - International Journal of …, 2013 - inderscienceonline.com
Steganography is a powerful method to conceal the existence of secret data inside a cover
object. The concealment steps are performed in the spatial domain and/or the transform …

Analysis and modeling of FPGA implementations of spatial steganography methods

BJ Mohd, T Hayajneh, S Abed… - Journal of Circuits, Systems …, 2014 - World Scientific
Steganography has become an important method for concealed communication especially
through image files. Recent proposed steganographic methods employ multiple levels of …

Hide and seek in silicon–Performance analysis of Quad block Equisum Hardware Steganographic systems

S Rajagopalan, S Janakiraman, HN Upadhyay… - Procedia …, 2012 - Elsevier
Steganography has become a predominantly employed information security technique in
this modern era. Although the software methods which work on spatial as well as transform …

A comparative study of steganography designs based on multiple FPGA platforms

BJ Mohd, T Hayajneh, ZA Khalaf… - … Journal of Electronic …, 2016 - inderscienceonline.com
Steganography methods conceal covert messages inside communicated data. Field-
programmable gate array (FPGA) hardware implementation provides speed, flexibility and …

[PDF][PDF] MSB based embedding with integrity: An adaptive RGB Stego on FPGA platform

S Rajagopalan, PJS Prabhakar… - Information …, 2014 - researchgate.net
Information hiding as a field is extremely fast develo** and one of the very few fields that
derive its power from its inherent need for sophistication and complexity in its algorithms. Out …

Novel algorithm and architectures for high-speed low-power ConText-based steganography

S Timarchi, MA Alaei… - 2017 19th International …, 2017 - ieeexplore.ieee.org
Least Significant Bit (LSB) insertion method is a popular type of steganographic algorithms
in spatial domain. Nevertheless, in this approach essential measures should be considered …

Crypto‐Stego‐Real‐Time (CSRT) System for Secure Reversible Data Hiding

L Desai, S Mali - VLSI Design, 2018 - Wiley Online Library
Due to demand of information transfer through higher speed wireless communication
network, it is time to think about security of important information to be transferred. Further …

Image digital watermarking based on a novel clock-controlled generator

E Bai, Y Yang, X Jiang - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
Based on the m-sequence on finite field GF (2), a novel clock-controlled generator (NCCG)
has been proposed by combining the shrinking generator and the self-shrinking generator …

Multiplexed stego path on reconfigurable hardware: A novel random approach

B Ramalingam, R Amirtharajan… - Computers & Electrical …, 2016 - Elsevier
Abstract Information security, though having different areas of interest, is fairly specific and
confined to secure digital data transmission. Currently, there are many data security …