Skip to main content

VLSI-Based Data Hiding with Transform Domain Module Using FPGA

  • Conference paper
  • First Online:
Intelligent Computing and Information and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 673))

Abstract

In this rapidly growing internet era, researchers are giving more and more attention toward robust, secure, and fast communication channels while hiding sensitive data. The concealment steps can be done through a spatial domain or the transform domain. This paper proposes a data hiding system with an adaptive Very Large-Scale Integration (VLSI) module to enhance the security and robustness of embedded data. The Field Programmable Gate Arrays (FPGA) implementation approach of data hiding technique provides not only pipelined and parallel operations, but also gives the perfect guard against malicious attacks. The proposed algorithm is implemented on a Xilinx Virtex 5 FPGA board. Further, the transform domain technique also optimizes memory space and reduces the execution time through pipelining. The performance of the implemented system is measured using different parameters like resource utilization, Mean Squared Error (MSE), and Peak Signal-to-Noise Ratio (PSNR).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bassam Jamil Mohd, Thaier Hayajneh, et al “Wavelet-transform steganography: Algorithm and hardware implementation”, International journal of electronic security and digital forensics January 2013.

    Google Scholar 

  2. R. Sundararaman and Har Narayan Upadhyay, “Stego System on Chip with LFSR based Information Hiding Approach,” International Journal of Computer Application, Vol. 18, No.2, pp. 24–31, 2011.

    Google Scholar 

  3. Hemalatha Sa,1, U. Dinesh Acharyaa, “Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science 47 (2015) 272–281. © 2015 The Authors. Published by Elsevier B.V.

    Google Scholar 

  4. Saeed Mahmoudpour, Sattar Mirzakuchaki, “Hardware Architecture for a Message Hiding Algorithm with Novel Randomizers”, International Journal of Computer Applications, Vol 37, No7, Jan 2012.

    Google Scholar 

  5. S. Al-Fahoum and M. Yaser Reversible Data Hiding Using Contrast Enhancement Approach International Journal of Image Processing (IJIP), Volume 7: Issue 3: 2013.

    Google Scholar 

  6. Mr. Jagadeesha, Mrs. Manjula, “FPGA Implementation X-Box Mapping for an Image Steganography Technique”, International Journal of Advanced Research in Electrical, Electronics, Instrumentation Engg. Vol.2 Issue 6, June 2013.

    Google Scholar 

  7. Hao Chen, Yu Chen, “A Survey on the Application of FPGA’s for Network Infrastructure Security”, IEEE Communications Surveys & Tutorials 2010.

    Google Scholar 

  8. Satwinder Singh and Varinder Kaur Attri, “State-of-the-art Review on Steganographic Techniques”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.8, No.7 (2015), pp. 161–170.

    Google Scholar 

  9. Rinita Roy, SumitLaha, “Optimization Stego Image rataining secret information using Genetic Algorith with 8-connected PSNR”, Published by Elsevier B. V. 2015.

    Google Scholar 

  10. Ammar Odeh, Khaled Elleithy, Miad Faezipour, “A Reliable and Fast Real-Time Hardware Engine for Text Steganography” from https://www.researchgate.net/publication/262013703.

  11. Dr. S Sivasubramanian, Dr, Janardhana Raju, “Advanced Embedding of Information by Secure Key Exchange via Trusted Third Party using Steganography”, International Journal of Latest Research in Science and Technology Vol., 2 Issue 1 Page No. 536–540, 2013.

    Google Scholar 

  12. XzMin Wu, et al. “Data Hiding in Image and Video: Part I—Fundamental Issues and Solutions”, IEEE Transactions on Image Processing, vol. 12, no. 6, June 2003.

    Google Scholar 

  13. Y. K. Lin, “High capacity reversible data hiding scheme based upon discrete cosine transformation,” Journal of Systems and Software, vol. 85, no. 10, pp. 2395–2404, 2012.

    Google Scholar 

  14. Shabir A. Parah, Javaid A. Sheikh and G.M. Bhat, “Data Hiding in Intermediate Significant Bit Planes, A High Capacity Blind Steganographic Technique,” IEEE International Conference on Emerging Trends in Science, Engineering and Technology, pp. 192–197, 2012.

    Google Scholar 

  15. Edgar Gomez-Hernandez, Claudia Feregrino-Uribe, Rene Cumplido, “FPGA Hardware Architecture of the SteganographicConText Technique”, 18th ICECC,0–7695-3120-2/2008IEEE.

    Google Scholar 

  16. Hala A. Faroul, MagdiSaeb, “An Improved FPGA Implementation of the MHHEA for Data Communication Security”, proceeding of the Design, 1530–1591/05, IEEE.

    Google Scholar 

  17. Po-Yueh Chen, Hung-Ju Lin, “A DWT based Approach for Image Steganography”, International Journal of Applied Science and Engineering 2006, Vol. 4 No-3, Page No 275–290, 2006.

    Google Scholar 

  18. H.B. Kekre, A. Athawale, “Performance Comparison of DCT and Walsh Transform for Steganography”, International Conf& Workshop on Emerging Trends in Technology, 2010.

    Google Scholar 

  19. Maninder Singh Rana, Bhupender Singh Sangwan, “Art of Hiding: An Introduction to Steganography”, International Journal Of Engineering And Computer Science Vol. 1, Issue 1, Page No. 11–12, Oct 2012.

    Google Scholar 

  20. Dr. S Sivasubramanian, Dr, JanardhanaRaju, “Advanced Embedding of Information by Secure Key Exchange via Trusted Third Party using Steganography”, International Journal of Latest Research in Science and Technology Vol., 2 Issue 1 Page No. 536–540, 2013.

    Google Scholar 

  21. BassamJamilMohd, Sa’ed Abed, et. at., “Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods” article in journal of circuits system and computers. February 2014.

    Google Scholar 

  22. Multiplexed Stego path on reconfigurable hardware: A novel random approach, BalakrishnanRamalingam, Rengarajan Amitharajan, John Bosco Balaguru Rayappan, Elsevier (science direct) 2016.

    Google Scholar 

  23. S. Raveendra Reddy and S. M. Sakthivel, “A FPGA Implementation of Dual Images based Reversible Data Hiding Technique using LSB Matching with Pipelining”, Indian Journal of Science and Technology, Vol 8(25) IJST/2015/v8i25/80980, October 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Latika R. Desai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Desai, L.R., Mali, S.N. (2018). VLSI-Based Data Hiding with Transform Domain Module Using FPGA. In: Bhalla, S., Bhateja, V., Chandavale, A., Hiwale, A., Satapathy, S. (eds) Intelligent Computing and Information and Communication. Advances in Intelligent Systems and Computing, vol 673. Springer, Singapore. https://doi.org/10.1007/978-981-10-7245-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7245-1_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7244-4

  • Online ISBN: 978-981-10-7245-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics