메뉴 건너뛰기




Volumn 8, Issue 2, 2016, Pages 164-190

A comparative study of steganography designs based on multiple FPGA platforms

Author keywords

Data hiding; Field programmable gate array; FPGA; Information security; Modelling; Spatial steganography

Indexed keywords

LOGIC GATES; MODELS; SECURITY OF DATA; STEGANOGRAPHY; TEXTURES;

EID: 84962356004     PISSN: 1751911X     EISSN: 17519128     Source Type: Journal    
DOI: 10.1504/IJESDF.2016.075589     Document Type: Article
Times cited : (11)

References (47)
  • 3
    • 84859252029 scopus 로고    scopus 로고
    • Design and analysis of prototype hardware for secret sharing using 2-D image processing
    • July
    • Amirtharajan, R., Balaguru, R. and Ganesan, V. (2010) 'Design and analysis of prototype hardware for secret sharing using 2-D image processing', International Journal of Computer Applications, July, Vol. 4, No. 4, pp. 17-22.
    • (2010) International Journal of Computer Applications , vol.4 , Issue.4 , pp. 17-22
    • Amirtharajan, R.1    Balaguru, R.2    Ganesan, V.3
  • 5
    • 84885225180 scopus 로고    scopus 로고
    • Architectures of flexible symmetric key crypto engines -A survey: From hardware coprocessor to multi-cryptoprocessor system on chip
    • Bossuet, L., Grand, M., Gaspar, L., Fischer, V. and Gogniat, H. (2013) 'Architectures of flexible symmetric key crypto engines -A survey: From hardware coprocessor to multi-cryptoprocessor system on chip', ACM Computing Surveys (CSUR), Vol. 45, No. 4, p.41.
    • (2013) ACM Computing Surveys (CSUR) , vol.45 , Issue.4 , pp. 41
    • Bossuet, L.1    Grand, M.2    Gaspar, L.3    Fischer, V.4    Gogniat, H.5
  • 6
    • 1642298070 scopus 로고    scopus 로고
    • Biostatistics 104: Correlational analysis
    • Chan, Y.H. (2003) 'Biostatistics 104: Correlational analysis', Singapore Med J, Vol. 44, No. 12, pp. 614-619.
    • (2003) Singapore Med J , vol.44 , Issue.12 , pp. 614-619
    • Chan, Y.H.1
  • 7
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • 6 March
    • Cheddad, A., Condell, J., Curran, K. and Kevitt, P. (2010) 'Digital image steganography: Survey and analysis of current methods', Signal Processing, 6 March, Vol. 90, No. 3, pp. 727-752.
    • (2010) Signal Processing , vol.90 , Issue.3 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Kevitt, P.4
  • 8
    • 84962358726 scopus 로고    scopus 로고
    • Cyclone II Architecture [online] (accessed 08-01-2014)
    • Cyclone II Architecture [online] http://www.altera.com/literature/hb/cyc2/cyc2-cii51002.pdf (accessed 08-01-2014).
  • 9
    • 2442504653 scopus 로고    scopus 로고
    • Design and implementation of a secret key steganographic micro-architecture employing FPGA
    • October
    • Farouk, H. and Saeb, M. (2004) 'Design and implementation of a secret key steganographic micro-architecture employing FPGA', Asia and South Pacific Design Automation Conference (ASP-DAC), October, pp. 577-578.
    • (2004) Asia and South Pacific Design Automation Conference (ASP-DAC) , pp. 577-578
    • Farouk, H.1    Saeb, M.2
  • 10
    • 79954457569 scopus 로고    scopus 로고
    • Design of adaptive steganographic schemes for digital images
    • International Society for Optics and Photonics
    • Filler, T. and Fridrich, J. (2011) 'Design of adaptive steganographic schemes for digital images', IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics, pp. 78800F-78800F.
    • (2011) IS&T/SPIE Electronic Imaging , pp. 78800F-78800F
    • Filler, T.1    Fridrich, J.2
  • 13
  • 17
    • 77952377607 scopus 로고    scopus 로고
    • Performance comparison of DCT and Walsh transform for steganography
    • India
    • Kekre, H., Athawale, A., Halankar, P. and Banura, V. (2010) 'Performance comparison of DCT and Walsh transform for steganography', ICWET Conference, India, pp. 81-88.
    • (2010) ICWET Conference , pp. 81-88
    • Kekre, H.1    Athawale, A.2    Halankar, P.3    Banura, V.4
  • 23
    • 84925598977 scopus 로고    scopus 로고
    • An FPGA implementation of secured steganography communication system
    • Mahmood, A. (2014) 'An FPGA implementation of secured steganography communication system', Tikrit Journal of Engineering Science (TJES), Vol. 21, No. 1, pp. 1-9.
    • (2014) Tikrit Journal of Engineering Science (TJES) , vol.21 , Issue.1 , pp. 1-9
    • Mahmood, A.1
  • 27
    • 84885941452 scopus 로고    scopus 로고
    • Hierarchical steganography using novel optimum quantization technique
    • Mohd, B.J., Abed, S., Naami, B. and Hayajneh, T. (2013a) 'Hierarchical steganography using novel optimum quantization technique', Signal, Image and Video Processing, Vol. 7, No. 6, pp. 1029-1040, DOI: 10.1007/s11760-012-0301-9.
    • (2013) Signal, Image and Video Processing , vol.7 , Issue.6 , pp. 1029-1040
    • Mohd, B.J.1    Abed, S.2    Naami, B.3    Hayajneh, T.4
  • 30
    • 84943778934 scopus 로고    scopus 로고
    • A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
    • December
    • Mohd, B.J., Hayajneh, T. and Vasilakos, A.V. (2015b) 'A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues', Journal of Network and Computer Applications, December, Vol. 58, pp. 73-93.
    • (2015) Journal of Network and Computer Applications , vol.58 , pp. 73-93
    • Mohd, B.J.1    Hayajneh, T.2    Vasilakos, A.V.3
  • 31
    • 84897638271 scopus 로고    scopus 로고
    • Analysis and modeling of FPGA implementations of spatial steganography methods
    • February
    • Mohd, B.J., Hayajneh, T., Abed, S. and Itradat, A. (2014a) 'Analysis and modeling of FPGA implementations of spatial steganography methods', Journal of Circuits, Systems and Computers, World Scientific, February, Vol. 23, No. 2, p.1450018, DOI: 10.1142/S0218126614500182.
    • (2014) Journal of Circuits, Systems and Computers, World Scientific , vol.23 , Issue.2 , pp. 1450018
    • Mohd, B.J.1    Hayajneh, T.2    Abed, S.3    Itradat, A.4
  • 34
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • in Fong, P.W.L., Böhme, R. and Safavi-Naini, R. (Ed.):, Lecture Notes in Computer Science, Calgary, Canada, 28-30 June
    • Pevný, T., Filler, T. and Bas, P. (2010) 'Using high-dimensional image models to perform highly undetectable steganography', in Fong, P.W.L., Böhme, R. and Safavi-Naini, R. (Ed.): Information Hiding, 12th International Workshop, Lecture Notes in Computer Science, pp. 161-177, Calgary, Canada, 28-30 June.
    • (2010) Information Hiding, 12th International Workshop , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 35
    • 3042742327 scopus 로고    scopus 로고
    • Seek and hide: An introduction to steganography
    • June
    • Provos, N. and Honeyman, P. (2003) 'Seek and hide: An introduction to steganography', IEEE Security and Privacy, June, Vol. 1, No. 3, pp. 32-44.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 36
    • 84962355894 scopus 로고    scopus 로고
    • Quartus II Introduction Using Verilog Designs [online] (accessed 08-01-2014)
    • Quartus II Introduction Using Verilog Designs [online] ftp://ftp.altera.com/up/pub/Altera-Material/9.1/Tutorials/Verilog/Quartus-II-Introduction.pdf (accessed 08-01-2014).
  • 37
    • 84857377115 scopus 로고    scopus 로고
    • Survey and analysis of hardware cryptographic and steganographic systems on FPGA
    • Rajagopalan, S. and Amirtharajan, R. (2012) 'Survey and analysis of hardware cryptographic and steganographic systems on FPGA', Journal of Applied Sciences, Vol. 12, No. 3, pp. 201-210.
    • (2012) Journal of Applied Sciences , vol.12 , Issue.3 , pp. 201-210
    • Rajagopalan, S.1    Amirtharajan, R.2
  • 39
    • 52949134853 scopus 로고    scopus 로고
    • Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents
    • Springer Berlin Heidelberg
    • Rolfes, C. et al. (2008) 'Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents', Smart Card Research and Advanced Applications, Springer Berlin Heidelberg, Vol. 5189, pp. 89-103.
    • (2008) Smart Card Research and Advanced Applications , vol.5189 , pp. 89-103
    • Rolfes, C.1
  • 40
    • 84857387646 scopus 로고    scopus 로고
    • Stego system on chip with LFSR based information hiding approach
    • March
    • Sundararaman, R. and Upadhyay, H.N. (2011) 'Stego system on chip with LFSR based information hiding approach', International Journal of Computer Applications, March, Vol. 18, No. 2, pp. 24-31.
    • (2011) International Journal of Computer Applications , vol.18 , Issue.2 , pp. 24-31
    • Sundararaman, R.1    Upadhyay, H.N.2
  • 41
    • 30144433552 scopus 로고    scopus 로고
    • Optimized transmission of JPEG2000 streams over wireless channels
    • January
    • Thomos, N., Boulgouris, N.V. and Strintzis, M.G. (2006) 'Optimized transmission of JPEG2000 streams over wireless channels', IEEE Transaction on Image Processing, January, Vol. 15, No. 1, pp. 54-67.
    • (2006) IEEE Transaction on Image Processing , vol.15 , Issue.1 , pp. 54-67
    • Thomos, N.1    Boulgouris, N.V.2    Strintzis, M.G.3
  • 42
    • 84874111954 scopus 로고    scopus 로고
    • Data hiding based on image texture classification
    • 18 May
    • Varsaki, E., Fotopoulos, V. and Skodras, A. (2011) 'Data hiding based on image texture classification', Signal, Image and Video Processing, 18 May, Vol. 7, No. 2, pp. 247-253, DOI: 10.1007/s11760-011-0229-5.
    • (2011) Signal, Image and Video Processing , vol.7 , Issue.2 , pp. 247-253
    • Varsaki, E.1    Fotopoulos, V.2    Skodras, A.3
  • 43
    • 84962387843 scopus 로고    scopus 로고
    • Virtex-6 Family Overview [online] (accessed 08-01-2014)
    • Virtex-6 Family Overview [online] http://www.xilinx.com/support/documentation/data-sheets/ds150.pdf (accessed 08-01-2014).
  • 46
    • 85028207882 scopus 로고    scopus 로고
    • Defining embedding distortion for motion vector-based video steganography
    • Yao, Y., Zhang, W., Yu, N. and Zhao, X. (2014) 'Defining embedding distortion for motion vector-based video steganography', Multimedia Tools and Applications, Vol. 74, No. 24, pp. 1-24.
    • (2014) Multimedia Tools and Applications , vol.74 , Issue.24 , pp. 1-24
    • Yao, Y.1    Zhang, W.2    Yu, N.3    Zhao, X.4
  • 47
    • 84876480614 scopus 로고    scopus 로고
    • FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks
    • Zhang, X., Heys, H.M. and Li, C. (2012) 'FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks', Mobile Networks and Applications, Vol. 18, No. 2, pp. 222-234, DOI: 10.1007/s11036-012-0353-7.
    • (2012) Mobile Networks and Applications , vol.18 , Issue.2 , pp. 222-234
    • Zhang, X.1    Heys, H.M.2    Li, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.