FPGA based Data Hiding through Steganography
B. Murali Krishna1, Sarat K. Kotamraju2, Divya Chepuri3, Nagaraju Chattu4, Niharika Kamineni5
1Murali Krishna*, Department of Electronics and Communications Engineering, KL Deemed to be University (KLEF), Greenfields, Vaddeswaram Guntur, India.
2Sarat K. Kotamraju, Department of Electronics and Communications Engineering, KL Deemed to be University (KLEF), Greenfields, Vaddeswaram Guntur, India.
3Divya Chepuri, Department of Electronics and Communications Engineering, KL Deemed to be University (KLEF), Greenfields, Vaddeswaram Guntur, India.
4Nagaraju Chattu, Department of Electronics and Communications Engineering, KL Deemed to be University (KLEF), Greenfields, Vaddeswaram Guntur, India.
5Niharika Kamineni, Department of Electronics and Communications Engineering, KL Deemed to be University (KLEF), Greenfields, Vaddeswaram Guntur, India.
Manuscript received on April 30, 2020. | Revised Manuscript received on May 06, 2020. | Manuscript published on May 30, 2020. | PP: 2042-2045 | Volume-9 Issue-1, May 2020. | Retrieval Number: A2751059120/2020©BEIESP | DOI: 10.35940/ijrte.A2751.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Nowadays, the information security has been the key factor in communications, computer systems, electronic commerce and data sharing. One of the well-known methods for procuring the security of shared information using carrier files is steganography. The carrier file can be discrete such as image, text, audio and video etc. Digital images are the most commonly used format among those due to the high capacity and availability frequency. The hidden data is stored in an indistinct carrier in image steganography, i.e the digital image is used as a cover image to mask the secret message known as stego image. Cryptography can be then adapted for increasing the security of the stego image. A zig-zag MSB-LSB slicing based steganographic algorithm is proposed in this paper for concealing a secret image in a cover image. Power report and device utilization summary of the algorithm is calculated and the output is demonstrated on the VGA screen using BASYS3 Field Programmable Gate Array (FPGA).
Keywords: Cryptography, Steganography, MSB-LSB Slicing, FPGA.
Scope of the Article: Cryptography and Applied Mathematics