메뉴 건너뛰기




Volumn 23, Issue 2, 2014, Pages

Analysis and modeling of FPGA implementations of spatial steganography methods

Author keywords

Data hiding; FPGA; Modeling; Reconfigurable hardware; Security; Spatial steganography

Indexed keywords

ANALYSIS AND MODELING; DATA HIDING; FPGA IMPLEMENTATIONS; FPGA-HARDWARE IMPLEMENTATION; HARDWARE IMPLEMENTATIONS; LEAST SIGNIFICANT BITS; PERFORMANCE METRICS; SECURITY;

EID: 84897638271     PISSN: 02181266     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218126614500182     Document Type: Article
Times cited : (20)

References (29)
  • 1
    • 0031996445 scopus 로고    scopus 로고
    • George mason university exploring steganography: Seeing the unseen
    • N. F. Johnson and S. Jajodia, George Mason University, Exploring steganography: Seeing the unseen, IEEE Comput. 2 (1998) 26-34
    • (1998) IEEE Comput , vol.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 2
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • A. Cheddad, J. Condell, K. Curran and P. Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Process. 90 (2010) 727-752
    • (2010) Signal Process , vol.90 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Kevitt, P.4
  • 3
    • 3042742327 scopus 로고    scopus 로고
    • Seek and hide: An introduction to steganography
    • N. Provos and P. Honeyman, Seek and hide: An introduction to steganography, IEEE Security Privacy 1 (2003) 32-44
    • (2003) IEEE Security Privacy , vol.1 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 4
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • eds. P. W. L. Fong, R. B€ohme and Rei Safavi-Naini, Lecture Notes in Computer Science, Calgary, Canada, 28-30 June 2010
    • T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, 12th International Workshop, Information Hiding, eds. P. W. L. Fong, R. B€ohme and Rei Safavi-Naini, Lecture Notes in Computer Science, Calgary, Canada, 28-30 June 2010, pp. 161-177
    • 12th International Workshop, Information Hiding , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 6
    • 84885941452 scopus 로고    scopus 로고
    • Hierarchical steganography using novel optimum quantization technique
    • doi: 10.1007/s11760-012-0301-9
    • B. J. Mohd, S. Abed, B. Náami and T. Hayajneh, Hierarchical steganography using novel optimum quantization technique, Signal, Image Video Process, doi: 10.1007/s11760-012-0301-9
    • Signal, Image Video Process
    • Mohd, B.J.1    Abed, S.2    Náami, B.3    Hayajneh, T.4
  • 8
    • 84859252029 scopus 로고    scopus 로고
    • Design and analysis of prototype hardware for secret sharing using 2-D image processing
    • R. Amirtharajan, R. Balaguru and V. Ganesan, Design and analysis of prototype hardware for secret sharing using 2-D image processing, Int. J. Comput. Appl. 4 (2010) 17-22
    • (2010) Int. J. Comput. Appl , vol.4 , pp. 17-22
    • Amirtharajan, R.1    Balaguru, R.2    Ganesan, V.3
  • 9
    • 84876480614 scopus 로고    scopus 로고
    • Fpga implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks
    • doi: 10.1007/s11036-012-0353-7
    • X. Zhang, H. M. Heys and C. Li, FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks, Mobile Networks Appl. (2012), doi: 10.1007/s11036-012-0353-7
    • (2012) Mobile Networks Appl
    • Zhang, X.1    Heys, H.M.2    Li, C.3
  • 16
    • 84874111954 scopus 로고    scopus 로고
    • Data hiding based on image texture classi-cation, signal, image video process
    • doi: 10.1007/s11760-011-0229-5
    • E. Varsaki, V. Fotopoulos and A. Skodras, Data hiding based on image texture classi-cation, Signal, Image Video Process. Online FirstTM (2011), doi: 10.1007/s11760-011-0229-5
    • (2011) Online FirstTM
    • Varsaki, E.1    Fotopoulos, V.2    Skodras, A.3
  • 18
    • 0029669420 scopus 로고    scopus 로고
    • A comparative study of texture measures with classication based on featured distributions
    • T. Ojala, M. Pietikäinen and D. Harwood, A comparative study of texture measures with classication based on featured distributions, Pattern Recogn. 29 (1996) 51-59
    • (1996) Pattern Recogn , vol.29 , pp. 51-59
    • Ojala, T.1    Pietikäinen, M.2    Harwood, D.3
  • 19
    • 0036647193 scopus 로고    scopus 로고
    • Multiresolution gray-scale and rotation invariant texture classication with local binary patterns
    • T. Ojala, M. Pietikäinen and T. Mäenpää, Multiresolution gray-scale and rotation invariant texture classication with local binary patterns, IEEE Trans. Pattern Anal. Mach. Intell. 24 (2002) 971-987
    • (2002) IEEE Trans. Pattern Anal. Mach. Intell , vol.24 , pp. 971-987
    • Ojala, T.1    Pietikäinen, M.2    Mäenpää, T.3
  • 21
    • 84857387646 scopus 로고    scopus 로고
    • Stego system on chip with LFSR based information hiding approach
    • R. Sundararaman and H. N. Upadhyay, Stego system on chip with LFSR based information hiding approach, Int. J. Comput. Appl. 18 (2011) 24-31
    • (2011) Int. J. Comput. Appl , vol.18 , pp. 24-31
    • Sundararaman, R.1    Upadhyay, H.N.2
  • 22
    • 84857377115 scopus 로고    scopus 로고
    • Survey and analysis of hardware cryptographic and steganographic systems on fpga
    • S. Rajagopalan and R. Amirtharajan, Survey and analysis of hardware cryptographic and steganographic systems on FPGA, J. Appl. Sci. 12 (2012) 201-210
    • (2012) J. Appl. Sci , vol.12 , pp. 201-210
    • Rajagopalan, S.1    Amirtharajan, R.2
  • 23
    • 2442504653 scopus 로고    scopus 로고
    • Design and implementation of a secret key steganographic microarchitecture employing fpga
    • October
    • H. Farouk and M. Saeb, Design and implementation of a secret key steganographic microarchitecture employing FPGA, Asia and South Pacic Design Automation Conference (ASP-DAC), October 2004, pp. 577-578
    • (2004) Asia and South Pacic Design Automation Conference (ASP-DAC , pp. 577-578
    • Farouk, H.1    Saeb, M.2
  • 25
    • 30144433552 scopus 로고    scopus 로고
    • Optimized transmission of jpeg2000 streams over wireless channels
    • N. Thomos, N. V. Boulgouris and M. G. Strintzis, Optimized transmission of JPEG2000 streams over wireless channels, IEEE Trans. Image Process. 15 (2006) 54-67
    • (2006) IEEE Trans. Image Process , vol.15 , pp. 54-67
    • Thomos, N.1    Boulgouris, N.V.2    Strintzis, M.G.3
  • 27
    • 84861929653 scopus 로고    scopus 로고
    • Conguration tool for a wireless sensor network integrated security framework
    • doi: 10.1007/ s10922-011-9219-9228
    • V. Cionca, T. Newe and V. Dǎ;dâr, Conguration tool for a wireless sensor network integrated security framework, J. Network Syst. Manag. 20 (2012) 417-452, doi: 10.1007/ s10922-011-9219-8
    • (2012) J. Network Syst. Manag , vol.20 , pp. 417-452
    • Cionca, V.1    Newe, T.2    Dǎ, V.3    Dâr4
  • 28
    • 43949144611 scopus 로고    scopus 로고
    • A security-energy trade-o for authentic aggregation in sensor networks
    • WiMesh 2006 25 28 September 2006
    • E-O. Blass, J. Wilke and M. Zitterbart, A security-energy trade-o for authentic aggregation in sensor networks, 2nd IEEE Workshop on Wireless Mesh Networks, 2006, WiMesh 2006, 25-28 September 2006, pp. 135-137
    • (2006) 2nd IEEE Workshop on Wireless Mesh Networks , pp. 135-137
    • Blass, E.-O.1    Wilke, J.2    Zitterbart, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.