메뉴 건너뛰기




Volumn 5, Issue 3-4, 2013, Pages 241-256

Wavelet-transform steganography: Algorithm and hardware implementation

Author keywords

Data security; Digital signal processors; Field programmable gate arrays; Hardware implementation; Image processing; Security; Steganography; Very large scale integration; Wavelet transform

Indexed keywords

DIGITAL SIGNAL PROCESSORS; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); IMAGE PROCESSING; SECURITY OF DATA; STEGANOGRAPHY; VLSI CIRCUITS;

EID: 84892981941     PISSN: 1751911X     EISSN: 17519128     Source Type: Journal    
DOI: 10.1504/IJESDF.2013.058657     Document Type: Article
Times cited : (20)

References (27)
  • 2
    • 84893000417 scopus 로고    scopus 로고
    • Altera Inc., (accessed 1 March 2013)
    • Altera Inc., Quartus II Introduction Using Verilog Designs [online] http://ftp.altera.com/up/pub/Altera-Material/9.1/Tutorials/Verilog/ Quartus-II-Introduction.pdf (accessed 1 March 2013).
    • Quartus II Introduction Using Verilog Designs
  • 4
    • 84859252029 scopus 로고    scopus 로고
    • Design and analysis of prototype hardware for secret sharing using 2-D image processing
    • July
    • Amirtharajan, R., Balaguru, R. and Ganesan, V. (2010) 'Design and analysis of prototype hardware for secret sharing using 2-D image processing', International Journal of Computer Applications, July, Vol. 4, No. 4, pp. 17-22.
    • (2010) International Journal of Computer Applications , vol.4 , Issue.4 , pp. 17-22
    • Amirtharajan, R.1    Balaguru, R.2    Ganesan, V.3
  • 5
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • 6 March
    • Cheddad, A., Condell, J., Curran, K. and Kevitt, P. (2010) 'Digital image steganography: survey and analysis of current methods', Signal Processing, 6 March, Vol. 90, No. 3, pp. 727-752.
    • (2010) Signal Processing , vol.90 , Issue.3 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Kevitt, P.4
  • 7
    • 33846993721 scopus 로고    scopus 로고
    • Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation
    • Chen, W.Y. (2007) 'Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation', Applied Mathematics and Computation, Vol. 185, No. 1, pp. 432-448.
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.1 , pp. 432-448
    • Chen, W.Y.1
  • 8
    • 2442504653 scopus 로고    scopus 로고
    • Design and implementation of a secret key steganographic micro-architecture employing FPGA
    • October
    • Farouk, H. and Saeb, M. (2004) 'Design and implementation of a secret key steganographic micro-architecture employing FPGA', Asia and South Pacific Design Automation Conference (ASP-DAC) 2004, October, pp. 577-578.
    • (2004) Asia and South Pacific Design Automation Conference (ASP-DAC) 2004 , pp. 577-578
    • Farouk, H.1    Saeb, M.2
  • 12
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • February, George Mason University, Los Alamitos, USA
    • Johnson, N.F. and Jajodia, S. (1998) Exploring steganography: seeing the unseen', IEEE Computers, February, pp. 26-34, George Mason University, Los Alamitos, USA.
    • (1998) IEEE Computers , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 13
    • 77952377607 scopus 로고    scopus 로고
    • Performance comparison of DCT and Walsh transform for steganography
    • India
    • Kekre, H., Athawale, A., Halankar, P. and Banura, V. (2010) 'Performance comparison of DCT and Walsh transform for steganography', ICWET Conference, India, pp. 81-88.
    • (2010) ICWET Conference , pp. 81-88
    • Kekre, H.1    Athawale, A.2    Halankar, P.3    Banura, V.4
  • 14
    • 84892994767 scopus 로고    scopus 로고
    • A frequency domain steganography using Z Transform (FDSZT)
    • Rajagiri School of Engineering & Technology, 22-23 December, Kochin, arXiv:1202.4245
    • Mandal, J. (2011) 'A frequency domain steganography using Z Transform (FDSZT)', International Workshop on Embedded Computing and Communication System (IWECC 2011), Rajagiri School of Engineering & Technology, 22-23 December, Kochin, arXiv:1202.4245.
    • (2011) International Workshop on Embedded Computing and Communication System (IWECC 2011)
    • Mandal, J.1
  • 16
    • 84885941452 scopus 로고    scopus 로고
    • Hierarchical steganography using novel optimum quantization technique
    • March, DOI: 10.1007/s11760-012-0301-9
    • Mohd, B.J., Abed, S., Na'ami, B. and Hayajneh, T. (2012b) 'Hierarchical steganography using novel optimum quantization technique', Signal, Image and Video Processing, March, Vol. 7, No. 6, pp. 1029-1040, DOI: 10.1007/s11760-012- 0301-9.
    • (2012) Signal, Image and Video Processing , vol.7 , Issue.6 , pp. 1029-1040
    • Mohd, B.J.1    Abed, S.2    Na'Ami, B.3    Hayajneh, T.4
  • 18
    • 3042742327 scopus 로고    scopus 로고
    • Seek and hide: An introduction to steganography'
    • June
    • Provos, N. and Honeyman, P. (2003) 'Seek and hide: an introduction to steganography', IEEE Security and Privacy, June, Vol. 1, No. 3, pp. 32-44.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 20
    • 84857377115 scopus 로고    scopus 로고
    • Survey and analysis of hardware cryptographic and steganographic systems on FPGA
    • Rajagopalan, S. and Amirtharajan, R. (2012) 'Survey and analysis of hardware cryptographic and steganographic systems on FPGA', Journal of Applied Sciences, Vol. 12, No. 3, pp. 201-210.
    • (2012) Journal of Applied Sciences , vol.12 , Issue.3 , pp. 201-210
    • Rajagopalan, S.1    Amirtharajan, R.2
  • 22
    • 84857387646 scopus 로고    scopus 로고
    • Stego system on chip with LFSR based information hiding approach
    • March
    • Sundararaman, R. and Upadhyay, H.N. (2011) 'Stego system on chip with LFSR based information hiding approach', International Journal of Computer Applications, March, Vol. 18, No. 2, pp. 24-31.
    • (2011) International Journal of Computer Applications , vol.18 , Issue.2 , pp. 24-31
    • Sundararaman, R.1    Upadhyay, H.N.2
  • 23
    • 30144433552 scopus 로고    scopus 로고
    • Optimized transmission of JPEG2000 streams over wireless channels
    • January
    • Thomos, N., Boulgouris, N.V. and Strintzis, M.G. (2006) 'Optimized transmission of JPEG2000 streams over wireless channels', IEEE Transaction on Image Processing, January, Vol. 15, No. 1, pp. 54-67.
    • (2006) IEEE Transaction on Image Processing , vol.15 , Issue.1 , pp. 54-67
    • Thomos, N.1    Boulgouris, N.V.2    Strintzis, M.G.3
  • 24
    • 84874111954 scopus 로고    scopus 로고
    • Data hiding based on image texture classification
    • Online First™, 18 May, Springer, Berlin, DOI: 10.1007/s11760-011- 0229-5
    • Varsaki, E., Fotopoulos, V. and Skodras, A. (2011) 'Data hiding based on image texture classification', Signal, Image and Video Processing, Online First™, 18 May, Springer, Berlin, DOI: 10.1007/s11760-011-0229-5.
    • (2011) Signal, Image and Video Processing
    • Varsaki, E.1    Fotopoulos, V.2    Skodras, A.3
  • 27
    • 24144467979 scopus 로고    scopus 로고
    • (v.8), 13 June, (accessed 1 March 2013)
    • Xilinx Inc. (2008) Spartan-II FPGA Family Data Sheet, (v.8), 13 June [online] http://www.xilinx.com/support/documentation/data-sheets/ds001.pdf (accessed 1 March 2013).
    • (2008) Spartan-II FPGA Family Data Sheet


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.