-
1
-
-
84867673199
-
Low power Wallace multiplier design based on wide counters
-
Abed, S., Mohd, B.J., Albayati, Z. and Alouneh, S. (2012) 'Low power Wallace multiplier design based on wide counters', International Journal of Circuit Theory and Applications, Vol. 40, No. 11, pp. 1175-1185.
-
(2012)
International Journal of Circuit Theory and Applications
, vol.40
, Issue.11
, pp. 1175-1185
-
-
Abed, S.1
Mohd, B.J.2
Albayati, Z.3
Alouneh, S.4
-
2
-
-
84892963560
-
Steganography: Random LSB insertion using discrete logarithm
-
Amin, M., Salleh, M., Ibrahim, S. and Katmin, M. (2003) 'Steganography: Random LSB insertion using discrete logarithm', 3rd International Conference on Information Technology in Asia (CTA03), pp. 234-238.
-
(2003)
3rd International Conference on Information Technology in Asia (CTA03
, pp. 234-238
-
-
Amin, M.1
Salleh, M.2
Ibrahim, S.3
Katmin, M.4
-
3
-
-
84859252029
-
Design and analysis of prototype hardware for secret sharing using 2-D image processing
-
July
-
Amirtharajan, R., Balaguru, R. and Ganesan, V. (2010) 'Design and analysis of prototype hardware for secret sharing using 2-D image processing', International Journal of Computer Applications, July, Vol. 4, No. 4, pp. 17-22.
-
(2010)
International Journal of Computer Applications
, vol.4
, Issue.4
, pp. 17-22
-
-
Amirtharajan, R.1
Balaguru, R.2
Ganesan, V.3
-
4
-
-
78049331003
-
ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware
-
Springer Berlin Heidelberg
-
Badel, S., Dagtekin, N., Nakahara Jr., J., Ouafi, K., Reffé, N., Sepehrdad, P., Sušil, P. and Vaudenay, S. (2010) 'ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware', Cryptographic Hardware and Embedded Systems, CHES 2010, Springer Berlin Heidelberg, pp. 398-412.
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES
, vol.2010
, pp. 398-412
-
-
Badel, S.1
Dagtekin, N.2
Nakahara, J.3
Ouafi, K.4
Reffé, N.5
Sepehrdad, P.6
Sušil, P.7
Vaudenay, S.8
-
5
-
-
84885225180
-
Architectures of flexible symmetric key crypto engines -A survey: From hardware coprocessor to multi-cryptoprocessor system on chip
-
Bossuet, L., Grand, M., Gaspar, L., Fischer, V. and Gogniat, H. (2013) 'Architectures of flexible symmetric key crypto engines -A survey: From hardware coprocessor to multi-cryptoprocessor system on chip', ACM Computing Surveys (CSUR), Vol. 45, No. 4, p.41.
-
(2013)
ACM Computing Surveys (CSUR)
, vol.45
, Issue.4
, pp. 41
-
-
Bossuet, L.1
Grand, M.2
Gaspar, L.3
Fischer, V.4
Gogniat, H.5
-
6
-
-
1642298070
-
Biostatistics 104: Correlational analysis
-
Chan, Y.H. (2003) 'Biostatistics 104: Correlational analysis', Singapore Med J, Vol. 44, No. 12, pp. 614-619.
-
(2003)
Singapore Med J
, vol.44
, Issue.12
, pp. 614-619
-
-
Chan, Y.H.1
-
7
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
6 March
-
Cheddad, A., Condell, J., Curran, K. and Kevitt, P. (2010) 'Digital image steganography: Survey and analysis of current methods', Signal Processing, 6 March, Vol. 90, No. 3, pp. 727-752.
-
(2010)
Signal Processing
, vol.90
, Issue.3
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.4
-
8
-
-
84962358726
-
-
Cyclone II Architecture [online] (accessed 08-01-2014)
-
Cyclone II Architecture [online] http://www.altera.com/literature/hb/cyc2/cyc2-cii51002.pdf (accessed 08-01-2014).
-
-
-
-
9
-
-
2442504653
-
Design and implementation of a secret key steganographic micro-architecture employing FPGA
-
October
-
Farouk, H. and Saeb, M. (2004) 'Design and implementation of a secret key steganographic micro-architecture employing FPGA', Asia and South Pacific Design Automation Conference (ASP-DAC), October, pp. 577-578.
-
(2004)
Asia and South Pacific Design Automation Conference (ASP-DAC)
, pp. 577-578
-
-
Farouk, H.1
Saeb, M.2
-
10
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
International Society for Optics and Photonics
-
Filler, T. and Fridrich, J. (2011) 'Design of adaptive steganographic schemes for digital images', IS&T/SPIE Electronic Imaging, International Society for Optics and Photonics, pp. 78800F-78800F.
-
(2011)
IS&T/SPIE Electronic Imaging
, pp. 78800F-78800F
-
-
Filler, T.1
Fridrich, J.2
-
11
-
-
84892444721
-
On the implementation of a hardware architecture for an audio data hiding system
-
Garcia-Hernandez, J.J., Feregrino-Uribe, C., Cumplido, R. and Reta, C. (2011) 'On the implementation of a hardware architecture for an audio data hiding system', Journal of Signal Processing Systems, Vol. 64, No. 3, pp. 457-468.
-
(2011)
Journal of Signal Processing Systems
, vol.64
, Issue.3
, pp. 457-468
-
-
Garcia-Hernandez, J.J.1
Feregrino-Uribe, C.2
Cumplido, R.3
Reta, C.4
-
12
-
-
50149087873
-
FPGA hardware architecture of the steganographic context technique
-
CONIELECOMP 2008, March
-
Gomez-Hernandez, E., Feregrino-Uribe, C. and Cumplido, R. (2008) 'FPGA hardware architecture of the steganographic context technique', 18th International Conference on Electronics, Communications and Computers, CONIELECOMP 2008, March, pp. 123-128.
-
(2008)
18th International Conference on Electronics, Communications and Computers
, pp. 123-128
-
-
Gomez-Hernandez, E.1
Feregrino-Uribe, C.2
Cumplido, R.3
-
13
-
-
61849147785
-
-
3rd ed., Pearson Education, Upper Saddle River, NJ
-
Gonzalez, R. and Woods, R. (2008) Digital Image Processing, 3rd ed., Pearson Education, Upper Saddle River, NJ.
-
(2008)
Digital Image Processing
-
-
Gonzalez, R.1
Woods, R.2
-
14
-
-
80053476418
-
The LED block cipher
-
Springer Berlin Heidelberg
-
Guo, J., Peyrin, T., Poschmann, A. and Robshaw, M. (2011) 'The LED block cipher', Cryptographic Hardware and Embedded Systems -CHES 2011, pp. 326-341, Springer Berlin Heidelberg.
-
(2011)
Cryptographic Hardware and Embedded Systems -CHES 2011
, pp. 326-341
-
-
Guo, J.1
Peyrin, T.2
Poschmann, A.3
Robshaw, M.4
-
15
-
-
34547171700
-
Adaptive steganography based on textures
-
Herrera-Moro, D., Rodríguez-Colín, R. and Feregrino-Uribe, C. (2007) 'Adaptive steganography based on textures', 17th International Conference on Electronics, Communications and Computers (CONIELECOMP'07), pp. 34-34.
-
(2007)
17th International Conference on Electronics, Communications and Computers (CONIELECOMP'07
, pp. 34
-
-
Herrera-Moro, D.1
Rodríguez-Colín, R.2
Feregrino-Uribe, C.3
-
17
-
-
77952377607
-
Performance comparison of DCT and Walsh transform for steganography
-
India
-
Kekre, H., Athawale, A., Halankar, P. and Banura, V. (2010) 'Performance comparison of DCT and Walsh transform for steganography', ICWET Conference, India, pp. 81-88.
-
(2010)
ICWET Conference
, pp. 81-88
-
-
Kekre, H.1
Athawale, A.2
Halankar, P.3
Banura, V.4
-
18
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
ACM
-
Ker, A.D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J. and Pevný, T. (2013) 'Moving steganography and steganalysis from the laboratory into the real world', Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 45-58.
-
(2013)
Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security
, pp. 45-58
-
-
Ker, A.D.1
Bas, P.2
Böhme, R.3
Cogranne, R.4
Craver, S.5
Filler, T.6
Fridrich, J.7
Pevný, T.8
-
19
-
-
84866649340
-
Towards green cryptography: A comparison of lightweight ciphers from the energy viewpoint
-
Springer Berlin Heidelberg
-
Kerckhof, S., Durvaux, F., Hocquet, C., Bol, D. and Standaert, F.X. (2012) 'Towards green cryptography: A comparison of lightweight ciphers from the energy viewpoint', Cryptographic Hardware and Embedded Systems-CHES, Springer Berlin Heidelberg, pp. 390-407.
-
(2012)
Cryptographic Hardware and Embedded Systems-CHES
, pp. 390-407
-
-
Kerckhof, S.1
Durvaux, F.2
Hocquet, C.3
Bol, D.4
Standaert, F.X.5
-
20
-
-
77951862698
-
Modern steganalysis can detect YASS
-
San Jose, CA, 17-21 January
-
Kodovsky, J., Pevný, Y. and Fridrick, J. (2010) 'Modern steganalysis can detect YASS', Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, 17-21 January, pp. 02-01-02-11.
-
(2010)
Proc. SPIE, Electronic Imaging, Media Forensics and Security
, vol.12
, pp. 0201-0211
-
-
Kodovsky, J.1
Pevný, Y.2
Fridrick, J.3
-
21
-
-
33846634193
-
Measuring the gap between FPGAS and ASICS
-
Kuon, I. and Rose, J. (2007) 'Measuring the gap between FPGAs and ASICs', IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 26, No. 2, pp. 203-215.
-
(2007)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.26
, Issue.2
, pp. 203-215
-
-
Kuon, I.1
Rose, J.2
-
22
-
-
47349113729
-
Hardware realization of steganographic techniques
-
IEEE
-
Leung, H.Y., Cheng, L.M., Cheng, L.L. and Chan, C-K. (2007) 'Hardware realization of steganographic techniques', Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, IEEE, Vol. 1, pp. 279-282.
-
(2007)
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007
, vol.1
, pp. 279-282
-
-
Leung, H.Y.1
Cheng, L.M.2
Cheng, L.L.3
Chan, C.-K.4
-
23
-
-
84925598977
-
An FPGA implementation of secured steganography communication system
-
Mahmood, A. (2014) 'An FPGA implementation of secured steganography communication system', Tikrit Journal of Engineering Science (TJES), Vol. 21, No. 1, pp. 1-9.
-
(2014)
Tikrit Journal of Engineering Science (TJES)
, vol.21
, Issue.1
, pp. 1-9
-
-
Mahmood, A.1
-
24
-
-
28444437440
-
An image-in-image communication scheme and VLSI implementation using FPGA
-
IEEE
-
Maity, S.P., Banerjee, A. and Kundu, M.K. (2004) 'An image-in-image communication scheme and VLSI implementation using FPGA', India Annual Conference, Proceedings of the IEEE INDICON 2004, IEEE, pp. 6-11.
-
(2004)
India Annual Conference, Proceedings of the IEEE INDICON 2004
, pp. 6-11
-
-
Maity, S.P.1
Banerjee, A.2
Kundu, M.K.3
-
25
-
-
84864196452
-
FPGA hardware of the LSB steganography method
-
Mohd, B., Abed, S., Al-Hayajneh, T. and Alouneh, S. (2012a) 'FPGA hardware of the LSB steganography method', International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1-4, DOI: 10.1109/CITS.2012.6220393.
-
(2012)
International Conference on Computer, Information and Telecommunication Systems (CITS
, pp. 1-4
-
-
Mohd, B.1
Abed, S.2
Al-Hayajneh, T.3
Alouneh, S.4
-
26
-
-
84869594592
-
Image steganography optimization technique
-
Springer, Berlin, Heidelberg
-
Mohd, B.J., Saed, A., Al-Naami, B. and Alouneh, S. (2012b) 'Image steganography optimization technique', Signal Processing and Information Technology, Springer, Berlin, Heidelberg, pp. 205-209.
-
(2012)
Signal Processing and Information Technology
, pp. 205-209
-
-
Mohd, B.J.1
Saed, A.2
Al-Naami, B.3
Alouneh, S.4
-
27
-
-
84885941452
-
Hierarchical steganography using novel optimum quantization technique
-
Mohd, B.J., Abed, S., Naami, B. and Hayajneh, T. (2013a) 'Hierarchical steganography using novel optimum quantization technique', Signal, Image and Video Processing, Vol. 7, No. 6, pp. 1029-1040, DOI: 10.1007/s11760-012-0301-9.
-
(2013)
Signal, Image and Video Processing
, vol.7
, Issue.6
, pp. 1029-1040
-
-
Mohd, B.J.1
Abed, S.2
Naami, B.3
Hayajneh, T.4
-
28
-
-
84892981941
-
Wavelet-transform steganography: Algorithm and hardware implementation
-
Mohd, B.J., Hayajneh, T. and Quttoum, A.N. (2013b) 'Wavelet-transform steganography: Algorithm and hardware implementation', International Journal of Electronic Security and Digital Forensics, Vol. 5, Nos. 3-4, pp. 241-256.
-
(2013)
International Journal of Electronic Security and Digital Forensics
, vol.5
, Issue.3-4
, pp. 241-256
-
-
Mohd, B.J.1
Hayajneh, T.2
Quttoum, A.N.3
-
29
-
-
84933518959
-
Optimization and modeling of FPGA implementation of the Katan Cipher
-
IEEE
-
Mohd, B.J., Hayajneh, T.A. and Khalaf, Z.A. (2015a) 'Optimization and modeling of FPGA implementation of the Katan Cipher', 2015 6th International Conference on Information and Communication Systems (ICICS), IEEE, pp. 68-72.
-
(2015)
2015 6th International Conference on Information and Communication Systems (ICICS)
, pp. 68-72
-
-
Mohd, B.J.1
Hayajneh, T.A.2
Khalaf, Z.A.3
-
30
-
-
84943778934
-
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
-
December
-
Mohd, B.J., Hayajneh, T. and Vasilakos, A.V. (2015b) 'A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues', Journal of Network and Computer Applications, December, Vol. 58, pp. 73-93.
-
(2015)
Journal of Network and Computer Applications
, vol.58
, pp. 73-93
-
-
Mohd, B.J.1
Hayajneh, T.2
Vasilakos, A.V.3
-
31
-
-
84897638271
-
Analysis and modeling of FPGA implementations of spatial steganography methods
-
February
-
Mohd, B.J., Hayajneh, T., Abed, S. and Itradat, A. (2014a) 'Analysis and modeling of FPGA implementations of spatial steganography methods', Journal of Circuits, Systems and Computers, World Scientific, February, Vol. 23, No. 2, p.1450018, DOI: 10.1142/S0218126614500182.
-
(2014)
Journal of Circuits, Systems and Computers, World Scientific
, vol.23
, Issue.2
, pp. 1450018
-
-
Mohd, B.J.1
Hayajneh, T.2
Abed, S.3
Itradat, A.4
-
32
-
-
84943792295
-
Energy model for light-weight block ciphers for WBAN applications
-
Mohd, B.J., Hayajneh, T., Shakir, M.Z., Qaraqe, K.A. and Vasilakos, A.V. (2014b) 'Energy model for light-weight block ciphers for WBAN applications', MobiHealth 2014.
-
(2014)
MobiHealth 2014
-
-
Mohd, B.J.1
Hayajneh, T.2
Shakir, M.Z.3
Qaraqe, K.A.4
Vasilakos, A.V.5
-
33
-
-
48649102003
-
An overview of image steganography
-
Sandton, South Africa, June/July
-
Morkel, T., Eloff, J. and Olivier, M. (2005) 'An overview of image steganography', The Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July, pp. 1-11.
-
(2005)
The Fifth Annual Information Security South Africa Conference (ISSA2005)
, pp. 1-11
-
-
Morkel, T.1
Eloff, J.2
Olivier, M.3
-
34
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
in Fong, P.W.L., Böhme, R. and Safavi-Naini, R. (Ed.):, Lecture Notes in Computer Science, Calgary, Canada, 28-30 June
-
Pevný, T., Filler, T. and Bas, P. (2010) 'Using high-dimensional image models to perform highly undetectable steganography', in Fong, P.W.L., Böhme, R. and Safavi-Naini, R. (Ed.): Information Hiding, 12th International Workshop, Lecture Notes in Computer Science, pp. 161-177, Calgary, Canada, 28-30 June.
-
(2010)
Information Hiding, 12th International Workshop
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
35
-
-
3042742327
-
Seek and hide: An introduction to steganography
-
June
-
Provos, N. and Honeyman, P. (2003) 'Seek and hide: An introduction to steganography', IEEE Security and Privacy, June, Vol. 1, No. 3, pp. 32-44.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
36
-
-
84962355894
-
-
Quartus II Introduction Using Verilog Designs [online] (accessed 08-01-2014)
-
Quartus II Introduction Using Verilog Designs [online] ftp://ftp.altera.com/up/pub/Altera-Material/9.1/Tutorials/Verilog/Quartus-II-Introduction.pdf (accessed 08-01-2014).
-
-
-
-
37
-
-
84857377115
-
Survey and analysis of hardware cryptographic and steganographic systems on FPGA
-
Rajagopalan, S. and Amirtharajan, R. (2012) 'Survey and analysis of hardware cryptographic and steganographic systems on FPGA', Journal of Applied Sciences, Vol. 12, No. 3, pp. 201-210.
-
(2012)
Journal of Applied Sciences
, vol.12
, Issue.3
, pp. 201-210
-
-
Rajagopalan, S.1
Amirtharajan, R.2
-
38
-
-
84859019910
-
Hide and seek in silicon -performance analysis of quad block equisum hardware steganographic systems
-
Rajagopalan, S., Janakiraman, S., Upadhyay, H.N. and Thenmozhi, K. (2012) 'Hide and seek in silicon -performance analysis of quad block equisum hardware steganographic systems', International Conference on Communication Technology and System Design, Vol. 30, pp. 806-813.
-
(2012)
International Conference on Communication Technology and System Design
, vol.30
, pp. 806-813
-
-
Rajagopalan, S.1
Janakiraman, S.2
Upadhyay, H.N.3
Thenmozhi, K.4
-
39
-
-
52949134853
-
Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents
-
Springer Berlin Heidelberg
-
Rolfes, C. et al. (2008) 'Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents', Smart Card Research and Advanced Applications, Springer Berlin Heidelberg, Vol. 5189, pp. 89-103.
-
(2008)
Smart Card Research and Advanced Applications
, vol.5189
, pp. 89-103
-
-
Rolfes, C.1
-
40
-
-
84857387646
-
Stego system on chip with LFSR based information hiding approach
-
March
-
Sundararaman, R. and Upadhyay, H.N. (2011) 'Stego system on chip with LFSR based information hiding approach', International Journal of Computer Applications, March, Vol. 18, No. 2, pp. 24-31.
-
(2011)
International Journal of Computer Applications
, vol.18
, Issue.2
, pp. 24-31
-
-
Sundararaman, R.1
Upadhyay, H.N.2
-
41
-
-
30144433552
-
Optimized transmission of JPEG2000 streams over wireless channels
-
January
-
Thomos, N., Boulgouris, N.V. and Strintzis, M.G. (2006) 'Optimized transmission of JPEG2000 streams over wireless channels', IEEE Transaction on Image Processing, January, Vol. 15, No. 1, pp. 54-67.
-
(2006)
IEEE Transaction on Image Processing
, vol.15
, Issue.1
, pp. 54-67
-
-
Thomos, N.1
Boulgouris, N.V.2
Strintzis, M.G.3
-
42
-
-
84874111954
-
Data hiding based on image texture classification
-
18 May
-
Varsaki, E., Fotopoulos, V. and Skodras, A. (2011) 'Data hiding based on image texture classification', Signal, Image and Video Processing, 18 May, Vol. 7, No. 2, pp. 247-253, DOI: 10.1007/s11760-011-0229-5.
-
(2011)
Signal, Image and Video Processing
, vol.7
, Issue.2
, pp. 247-253
-
-
Varsaki, E.1
Fotopoulos, V.2
Skodras, A.3
-
43
-
-
84962387843
-
-
Virtex-6 Family Overview [online] (accessed 08-01-2014)
-
Virtex-6 Family Overview [online] http://www.xilinx.com/support/documentation/data-sheets/ds150.pdf (accessed 08-01-2014).
-
-
-
-
45
-
-
34247619423
-
Data hiding for speech bandwidth extension and its hardware implementation
-
IEEE
-
Wu, F., Chen, S. and Leung, H. (2006) 'Data hiding for speech bandwidth extension and its hardware implementation', 2006 IEEE International Conference on Multimedia and Expo, IEEE, pp. 1277-1280.
-
(2006)
2006 IEEE International Conference on Multimedia and Expo
, pp. 1277-1280
-
-
Wu, F.1
Chen, S.2
Leung, H.3
-
46
-
-
85028207882
-
Defining embedding distortion for motion vector-based video steganography
-
Yao, Y., Zhang, W., Yu, N. and Zhao, X. (2014) 'Defining embedding distortion for motion vector-based video steganography', Multimedia Tools and Applications, Vol. 74, No. 24, pp. 1-24.
-
(2014)
Multimedia Tools and Applications
, vol.74
, Issue.24
, pp. 1-24
-
-
Yao, Y.1
Zhang, W.2
Yu, N.3
Zhao, X.4
-
47
-
-
84876480614
-
FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks
-
Zhang, X., Heys, H.M. and Li, C. (2012) 'FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks', Mobile Networks and Applications, Vol. 18, No. 2, pp. 222-234, DOI: 10.1007/s11036-012-0353-7.
-
(2012)
Mobile Networks and Applications
, vol.18
, Issue.2
, pp. 222-234
-
-
Zhang, X.1
Heys, H.M.2
Li, C.3
|