Design And Implementation of Lifting Based Wavelet And Adaptive LSB Steganography to Secret Data Sharing Through Image on FPGA
Image steganography is an art of hiding images secretly within another image. There are several ways of performing image steganography; one among them is the spatial approach. The most popular spatial domain approach of image steganography is the Least Significant Bit (LSB) method, which hides the secret image pixel information in the LSB of the cover image pixel information. In this paper a LSB based steganography approach is used to design hardware architecture for the Image steganography. The Discrete Wavelet Transform (DWT) is used here to transform the cover image into higher and lower wavelet coefficients and use these coefficients in hiding the secret image. the design also includes encryption of secret image data, to provide a higher level of security to the secret image. The steganography system involving the stegno module and a decode module is designed here. The design was simulated, synthesized and implemented on Artix -7 FPGA. The operation hiding and retrieving images was successfully verified through simulations.
Sagar Kumar Nerella, Kamalendra Verma Gadi, & Raja Sekhar Chaganti. (2012, March). Securing images using color visual cryptography and wavelets. International Journal of Advanced Research in Computer Science and Software Engineering, 2(3), 163-168.
Calabrese Thomas. (2004). Information security intelligence: Cryptographic principles and applications. Clifton Park, NY: Delmar Learning. Available at: https://trove.nla.gov.au/work/30183833?q&versionId=36646266.
Prabhishek Singh & R S Chadha. (2013, March). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology, 2(9), 165-175.
B. Pushpa Devi, Kh. Manglem Sing, & Sudipta Roy. (2012, July). Dual image watermarking scheme based on singular value decomposition and visual cryptography in discrete wavelet transform. International Journal of Computer Applications, 50(12), 7-12.
M. Tayel, H. Shawky & A. E. S. Hafez. (2012). A new chaos steganography algorithm for hiding multimedia data. 14th International Conference on Advanced Communication Technology, IEEE, 208 – 212. Available at: file:///C:/Users/DST/Downloads/20120277_finalpaper.pdf.
Usha Bhanu. N, & Dr. A.Chilambuchelvan. (2012, April). A detailed survey on vlsi architectures for lifting based dwt for efficient hardware implementation. International Journal of VLSI design & Communication Systems, 3(2), 143-164.
Pritee Singh & Mr. Faseeh Ahmad. (2017, June). Hardware implementation of MAC using matlab simulink and FPGA. GRD Journals- Global Research and Development Journal for Engineering, 2(7), 38-44.
Copyright (c) 2018 International Journal of Engineering and Management Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.