Browse > Article
http://dx.doi.org/10.6109/jicce.2017.15.3.151

FPGA Implementation of LSB-Based Steganography  

Vinh, Quang Do (School of Electrical Engineering, University of Ulsan)
Koo, Insoo (School of Electrical Engineering, University of Ulsan)
Abstract
Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.
Keywords
Field programmable gate array; Hardware design; LSB steganography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. S. Al Rababaa, "Colored image-in-image hiding," in Proceedings of the 10th International Conference (CADSM2009): The Experience of Designing and Application of CAD Systems Microelectronics, Lviv-Polyana, Ukraine, pp. 445-450, 2009.
2 W. C. Chu, "DCT-based image watermarking using subsampling," IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 34-38, 2003.   DOI
3 M. S. Nixon and A. S. Aguado, Feature Extraction & Image Processing for Computer Vision, 3rd ed. London: Academic Press, 2012.
4 Y. Yang, P. Yuhua, and L. Zhaoguang, "A fast algorithm for YCbCr to RGB conversion," IEEE Transactions on Consumer Electronics, vol. 53, no. 4, pp. 1490-1493, 2007.   DOI
5 T. Risset, "SoC (System on Chip)," in Encyclopedia of Parallel Computing. Boston, MA: Springer, pp. 1837-1842, 2011.
6 S. Mahmoudpour and S. Mirzakuchaki, "Hardware architecture for a message hiding algorithm with novel randomizers," International Journal of Computer Applications, vol. 37, no. 7, pp. 46-53, 2012.   DOI
7 J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, 2001.   DOI
8 L. Wang, J. Wu, L. Jiao, L. Zhang, and G. Shi, "Lossy to lossless image compression based on reversible integer DCT," in Proceedings of 15th IEEE International Conference on Image Processing (ICIP2008), San Diego, CA, pp. 1037-1040, 2008.
9 M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, and M. Z. I. Shamsuddin, "Information hiding using steganography," in Proceedings of 4th National Conference on Telecommunication Technology (NCTT2003), Shah Alam, Malaysia, pp. 21-25, 2003.
10 N. F. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.   DOI
11 R. Chandramouli, M. Kharrazi, and N. Memon, "Image steganography and steganalysis: concepts and practice," in Digital Watermarking. Heidelberg: Springer, pp. 35-49, 2003.
12 S. Owais, A. Zaidi, T. A. Khan, S. S. Hussain, and M. Hashmani, "A trend in global steganography and steganalysis approaches," Asian Journal of Engineering, Sciences & Technology, vol. 4, no. 1, pp. 30-33, 2014.
13 G. Blanchet and M. Charbit, Digital Signal and Image Processing using MATLAB, 1st ed. New York, NY: Wiley, 2006.