2014
DOI: 10.1142/s0218126614500182
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Modeling of Fpga Implementations of Spatial Steganography Methods

Abstract: Steganography has become an important method for concealed communication especially through image files. Recent proposed steganographic methods employ multiple levels of complex techniques. Hence, there is an increasing significance for hardware implementation and its performance metrics. The objective of this article is to analyze and model the performance of FPGA hardware implementations of several spatial steganography methods, including: least significant bit (LSB), random LSB, mix-bit LSB and texture meth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Implementations were designed and analyzed based on advanced design flow similar to design flows used in other research works such as [36][37][38][39][40]. The design flow is summarized as follows:…”
Section: Design and Measurement Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Implementations were designed and analyzed based on advanced design flow similar to design flows used in other research works such as [36][37][38][39][40]. The design flow is summarized as follows:…”
Section: Design and Measurement Methodologymentioning
confidence: 99%
“…VCD files are fed to Quartus-II tool to compute design power. This technique is commonly used in research works such as [36][37][38][39][40] and [34]. The reported power is mainly the core dynamic power which includes combinational logic power, clock tree power and register power.…”
Section: Power Dissipationmentioning
confidence: 99%
“…Step- (8), it is possible to reduce the total time required for embedding all the bits of Message Cache as shown in Figure 4.…”
Section: Embedding Algorithmmentioning
confidence: 99%
“…However, the performance would have been better with parallelism in terms of area and time. Mohd et al [8] demonstrate the FPGA hardware implementation in spatial domain Steganography. Simulation, synthesis, and analysis show that random embedding increases utilization of LEs.…”
Section: Introductionmentioning
confidence: 99%
“…The FPGA design adheres to a predefined design flow to illustrate and justify the design results. Published FPGA studies typically highlight their design flow [ 60 , 61 ]. Figure 4 illustrates the research design flow, which consists of the design and analysis phases.…”
Section: Fpga Implementationmentioning
confidence: 99%