FPGA Implementation of Image Steganography Algorithm using Modified LSB Technique

Document Type : Original Article

Authors

1 Engineering Dept., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt.

2 Electronics and Electrical Communications Engineering Dept., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt.

3 Electronics and Electrical Communications Engineering Dept., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

Abstract

Steganography is one of the most efficient data hiding techniques,
where a secret message is embedded in a cover image in such a
way that only the cover image is visible and at the receiver, the
hidden message is extracted from the stego-image. In this paper, a
modified Least Significant Bit (LSB) technique is proposed and
applied to different grayscale cover images in a spatial domain.
Furthermore, the proposed algorithm is implemented using FPGA,
which provides a least embedding time, a faster programmable and
commercial hardware solution for secure communication. The
obtained results prove that, the proposed algorithm has low
computational complexity, high embedding speed and the capability
of embedding a large payload capacity compared to other
algorithms that implemented in low cost embedded system
applications.

Keywords


auto; -webkit-text-stroke-width: 0px; [1] Z. Y. Al-Omari and A. T. Al-Taani, Secure LSB steganography for
colored images using character-color mapping, The 8th International
Conference on Information and Communication Systems (ICICS), IEEE,
Jordan, 2017.
[2] S. Sugathan, An improved LSB embedding technique for image
steganography, The 2nd International Conference on Applied and
Theoretical Computing and Communication Technology (iCATccT),
IEEE, India, 2017.
[3] A. Arora, M. P. Singh, P. Thakral and N. Jarwal, Image steganography
using enhanced LSB substitution technique, The 4th International
Conference on Parallel, Distributed and Grid Computing (PDGC), IEEE,
India, 2016.
[4] S. Kaur, S. Bansal and R. K. Bansal, Steganography and Classification of
Image Steganography Techniques, International Conference on
Computing for Sustainable Global Development (INDIACom), IEEE,
India, 2014.
[5] V. Thanikaiselvan and P. Arulmozhivarman, High Security Image
Steganography Using IWT and Graph Theory, International Conference
on Signal and Image Processing Applications (lCSIPA), IEEE, Malaysia,
2013.
[6] W-N Lie and G-S Lin, A feature-based classification technique for blind
image steganalysis, IEEE Transactions on Multimedia, Vol.7, No.6,
pp.1007-1020, November 2005.
[7] D. S. Warkari and U. A. Kshirsagar, FPGA Implementation of Point
Processing Operation using Hardware Simulation, International Journal
of Advanced Research in Computer and Communication Engineering
Vol.4, No.4, pp.91-95, April 2015.
[8] M. Alareqi, R. Elgouri, M. Tarhda, K. Mateur, A. Zemmouri, A. Mezouari
and L. Hlou, Design and FPGA implementation of Real-Time Hardware
Co-Simulation for image enhancement in biomedical applications,
International Conference on Wireless Technologies, Embedded and
Intelligent Systems (WITS), IEEE, Morocco, 2017.
[9] V. Dhaka, R. C. Poonia and Y. V. Singh, A Novel Algorithm for Image
Steganography Based on Effective Channel Selection Technique,
International Journal of Advanced Research in Computer Science and
Software Engineering (IJARCSSE), Vol.3, No.8, pp.428-433, August 2013.
[10] Y. K. Jain and R. R. Ahirwal, A Novel Image Steganography Method with
Adaptive Number of Least Significant Bits Modification Based on Private
Stego-Keys, International Journal of Computer Science and Security,
Vol.4, No.1, pp.40-49, 2010.
webkit-text-size-adjust: auto; -webkit[11] C. Yang, F. Liu, X. Luo and Y. Zeng, Pixel Group Trace Model-Based
Quantitative Steganalysis for Multiple Least-Significant Bits
Steganography, IEEE Transactions on Information Forensics and
Security, Vol.8, No.1, pp.216-228, January 2013.
[12] R. Joshci, L. Gagnani and S. Pandey, Image Steganography With LSB,
International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET), Vol.2, No.1, pp.228-229, January 2013.
[13] S. Deepa and R. Umarani, A Study on Digital Image Steganography,
International Journal of Advanced Research in Computer Science and
Software Engineering, Vol.3, No.1, pp.54-57, January 2013.
[14] S. S. Kumar and M. Archana, Digital Image Steganography Techniques:
Case Study, International Journal of Research in Engineering &
Advanced Technology (IJREAT), Vol.2, No.2, pp.1-7, April-May 2014.
[15] T. Vanitha, A. D. Souza, B. Rashmi and S. Dsouza, A Review on
Steganography Least Significant Bit Algorithm and Discrete Wavelet
Transform Algorithm, International Journal of Innovative Research in
Computer and Communication Engineering (IJIRCCE), Vol.2, Special
Issue 5, pp.89-95, October 2014.
[16] S. A. Christe M. Vignesh and A. Kandaswamy, “An Efficient FPGA
Implementation of MRI Image Filtering and Tumour Characterization
Using Xilinx System Generator, International Journal of VLSI design &
Communication Systems (VLSICS) Vol. 2. No. 4, pp.95109, 2011.
[17] C. Sujatha and D. Selvathi, “Hardware Implementation of Image Edge
Detection Using Xilinx System Generator”, Asian journal of scientific
research, pp.111, 2014.
[18] K. A. Dakre and P. N. Pusdekar, “Image Enhancement using Hardware
co-simulation for Biomedical Applications”, International Journal on
Recent and Innovation Trends in Computing and Communication
(IJRITCC), Vol. 3, No. 2, pp.869877, 2015.
[19] G. Chawla, Kamaldeep, R. Yadav and S. Ravi, Analysis of Various Image
Steganography Techniques on the Basis of Normalized Cross - Correlation
(NCC), International Journal of Advanced and Innovative Research
(IJAIR), Vol.1, No.2, July 2012.
[20] Ö. ÇATALTA and K. TÜTÜNCÜ, Comparison of LSB Image
Steganography Technique in Different Color Spaces, International
Artificial Intelligence and Data Processing Symposium (IDAP), IEEE,
Malatya, Turkey, 16-17 Sep. 2017.
[21] M. Juneja and P. S. Sandhu, An Improved LSB based Steganography
Technique for RGB Color Images, Second International Conference on
Latest Computational Technologies (ICLCT-2013), pp.1014, London,
UK, 1718 June 2013.
[22] S. Bukhari, M. S. Arif, M. R. Anjum and S. Dilbar, Enhancing security of
images by Steganography and Cryptography techniques, The Sixth