FPGA usage in Real time Steganography

Kishore, B and Arjunan, Vijaya R and Kumar, Vijaya V (2012) FPGA usage in Real time Steganography. In: Proceedings of International Conference on Recent Advances in Computer Sciences-ICRACS2012, 2012.

[img] PDF
ICRACS_March2012.pdf - Published Version
Restricted to Registered users only

Download (227kB)

Abstract

“Steganography is the art of hiding information in ways that prevent the detection of hidden messages,” maintaining the secrecy of digital information when being communicated over the Internet is presently a challenge. Given the amount of cheap computation power available and certain known limitations of the encryption methods it is not too difficult to launch attacks on cipher-text. Adaptive steganography comes closer to this ideal since it exploits the natural variations in the pixel intensities of a cover image to hide the secret message. We are investigating its embedding, detecting, and coding techniques. The idea behind the LSB algorithm is to insert the bits of the hidden message into the least significant bits of the pixels. As the application domain of embedding data in digital multimedia sources becomes broaden, several terms are used by various groups of researchers, including steganography, digital watermarking, and data hiding. This paper introduces a new, principled approach for detecting least significant bit (LSB) steganography in digital signals such as images and audio. It is shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision. The new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations. The resulting detection algorithm is simple and fast. To evaluate the robustness of the proposed steganalytic approach, bounds on estimation errors are developed. Furthermore, the vulnerability of the new approach to possible attacks is also assessed, and counter measures are suggested. A detailed algorithm is presented along with results of its application on some sample images

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Steganography, watermarking, vulnerability, pixels, data hiding, embedding
Subjects: Engineering > MIT Manipal > Computer Science and Engineering
Depositing User: MIT Library
Date Deposited: 18 Apr 2013 07:09
Last Modified: 18 Apr 2013 07:09
URI: http://eprints.manipal.edu/id/eprint/79739

Actions (login required)

View Item View Item