FPGA Implementation of Image Steganography Algorithm using Modified LSB Technique | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 18, Volume 27, Issue 2, July 2018, Page 389-406 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2018.63268 | ||||
View on SCiNiTO | ||||
Authors | ||||
E. A. Elshazly1; Safey A. S. Abdel wahab1; R. M. Fikry1; O. Zahran2; S. M. Elaraby3; M. El-Kordy2 | ||||
1Engineering Dept., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt. | ||||
2Electronics and Electrical Communications Engineering Dept., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt. | ||||
3Electronics and Electrical Communications Engineering Dept., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt | ||||
Abstract | ||||
Steganography is one of the most efficient data hiding techniques, where a secret message is embedded in a cover image in such a way that only the cover image is visible and at the receiver, the hidden message is extracted from the stego-image. In this paper, a modified Least Significant Bit (LSB) technique is proposed and applied to different grayscale cover images in a spatial domain. Furthermore, the proposed algorithm is implemented using FPGA, which provides a least embedding time, a faster programmable and commercial hardware solution for secure communication. The obtained results prove that, the proposed algorithm has low computational complexity, high embedding speed and the capability of embedding a large payload capacity compared to other algorithms that implemented in low cost embedded system applications. | ||||
Keywords | ||||
Image steganography; Least Significant Bit (LSB); Field Programmable Gate Array (FPGA); Peak Signal to Noise Ratio (PSNR) and Xilinx System Generator (XSG) | ||||
References | ||||
auto; -webkit-text-stroke-width: 0px; [1] Z. Y. Al-Omari and A. T. Al-Taani, “Secure LSB steganography for colored images using character-color mapping”, The 8th International Conference on Information and Communication Systems (ICICS), IEEE, Jordan, 2017. [2] S. Sugathan, “An improved LSB embedding technique for image steganography”, The 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), IEEE, India, 2017. [3] A. Arora, M. P. Singh, P. Thakral and N. Jarwal, “Image steganography using enhanced LSB substitution technique”, The 4th International Conference on Parallel, Distributed and Grid Computing (PDGC), IEEE, India, 2016. [4] S. Kaur, S. Bansal and R. K. Bansal, “Steganography and Classification of Image Steganography Techniques”, International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, India, 2014. [5] V. Thanikaiselvan and P. Arulmozhivarman, “High Security Image Steganography Using IWT and Graph Theory”, International Conference on Signal and Image Processing Applications (lCSIPA), IEEE, Malaysia, 2013. [6] W-N Lie and G-S Lin, “A feature-based classification technique for blind image steganalysis”, IEEE Transactions on Multimedia, Vol.7, No.6, pp.1007-1020, November 2005. [7] D. S. Warkari and U. A. Kshirsagar, “FPGA Implementation of Point Processing Operation using Hardware Simulation”, International Journal of Advanced Research in Computer and Communication Engineering Vol.4, No.4, pp.91-95, April 2015. [8] M. Alareqi, R. Elgouri, M. Tarhda, K. Mateur, A. Zemmouri, A. Mezouari and L. Hlou, “Design and FPGA implementation of Real-Time Hardware Co-Simulation for image enhancement in biomedical applications”, International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), IEEE, Morocco, 2017. [9] V. Dhaka, R. C. Poonia and Y. V. Singh, “A Novel Algorithm for Image Steganography Based on Effective Channel Selection Technique”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol.3, No.8, pp.428-433, August 2013. [10] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys”, International Journal of Computer Science and Security, Vol.4, No.1, pp.40-49, 2010. webkit-text-size-adjust: auto; -webkit[11] C. Yang, F. Liu, X. Luo and Y. Zeng, “Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography”, IEEE Transactions on Information Forensics and Security, Vol.8, No.1, pp.216-228, January 2013. [12] R. Joshci, L. Gagnani and S. Pandey, “Image Steganography With LSB”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol.2, No.1, pp.228-229, January 2013. [13] S. Deepa and R. Umarani, “A Study on Digital Image Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.1, pp.54-57, January 2013. [14] S. S. Kumar and M. Archana, “Digital Image Steganography Techniques: Case Study”, International Journal of Research in Engineering & Advanced Technology (IJREAT), Vol.2, No.2, pp.1-7, April-May 2014. [15] T. Vanitha, A. D. Souza, B. Rashmi and S. Dsouza, “A Review on Steganography – Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.2, Special Issue 5, pp.89-95, October 2014. [16] S. A. Christe M. Vignesh and A. Kandaswamy, “An Efficient FPGA Implementation of MRI Image Filtering and Tumour Characterization Using Xilinx System Generator”, International Journal of VLSI design & Communication Systems (VLSICS) Vol. 2. No. 4, pp.95–109, 2011. [17] C. Sujatha and D. Selvathi, “Hardware Implementation of Image Edge Detection Using Xilinx System Generator”, Asian journal of scientific research, pp.1–11, 2014. [18] K. A. Dakre and P. N. Pusdekar, “Image Enhancement using Hardware co-simulation for Biomedical Applications”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), Vol. 3, No. 2, pp.869–877, 2015. [19] G. Chawla, Kamaldeep, R. Yadav and S. Ravi, “Analysis of Various Image Steganography Techniques on the Basis of Normalized Cross - Correlation (NCC)”, International Journal of Advanced and Innovative Research (IJAIR), Vol.1, No.2, July 2012. [20] Ö. ÇATALTA and K. TÜTÜNCÜ, “Comparison of LSB Image Steganography Technique in Different Color Spaces”, International Artificial Intelligence and Data Processing Symposium (IDAP), IEEE, Malatya, Turkey, 16-17 Sep. 2017. [21] M. Juneja and P. S. Sandhu, “An Improved LSB based Steganography Technique for RGB Color Images”, Second International Conference on Latest Computational Technologies (ICLCT-2013), pp.10–14, London, UK, 17–18 June 2013. [22] S. Bukhari, M. S. Arif, M. R. Anjum and S. Dilbar, “Enhancing security of images by Steganography and Cryptography techniques”, The Sixth | ||||
Statistics Article View: 239 |
||||