FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - December Issue 2013 by IJCTT Journal|
|Volume-6 Issue-1 |
|Year of Publication : 2013|
|Authors :B.Vasantha Lakshmi, B.Vidheya Raju|
B.Vasantha Lakshmi, B.Vidheya Raju"FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor"International Journal of Computer Trends and Technology (IJCTT),V6(1):6-14 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- -We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with high degree of data integrity. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden information in the cover file. This paper explains the LSB Embedding technique with lifting based DWT schemes by using Micro blaze Processor implemented in a FPGA using System C coding.
 Pfitzmann Birgit. Information Hiding Terminology, First International Workshop, Cambridge, UK, Proceedings, Computer Science, 1174. pp. 347-350, May–June.
 Westfield Andreas and Andreas Pfitzmann, Attacks on Steganographic Systems, Third International Workshop, IH`99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999.
 Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science,Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
 Wei Zhang,Zhe Jiang,Zhiyu Gao, and Yanyan Liu,”An efficient VLSI architecture for Lifting based discrete wavelet transform,”IEEE Trans.Circuits and systems,vol.59,NO.3,pp. 158-162,Mar.2012.
 G. Xing, J. Li, and Y. Q. Zhang, “Arbitrarily shaped videoobject coding by wavelet,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 10,pp. 1135–1139, Oct. 2001.
 S. C. B. Lo, H. Li, and M. T. Freedman, “Optimization of wavelet decomposition for image compression and feature preservation,” IEEE Trans.Med. Imag., vol. 22, no. 9, pp. 1141–1151, Sep. 2003.
 K. K. Parhi and T. Nishitani, “VLSI architecture for discrete wavelet transforms,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 1, no. 2, pp. 191–202, Jun. 1993.
 X. X. Qin and M. Wang, “A review on detection of LSB matching steganography,” Inf. Technol. J., vol. 9, pp. 1725–1738, 2010.
 A. D. Ker, “Locating steganographic payload via WS residuals,” inACM Proc. 10th Multimed. Secur. Workshop, 2008, pp. 27–31.
 A. D. Ker, “A general framework for the structural steganalysis of LSBreplacement,” in Proc. 7th Inf. Hiding Workshop, ser. Springer LNCS, 2005, vol. 3727, pp. 296–311.
 J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color and grayscale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, 2001.
 S. Dumitrescu, X.Wu, and Z.Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Trans. Signal Process., vol. 51, pp.1995–2007, Jun. 2003.
 A. Ker, “Steganalysis of LSB matching in grayscale images,” Signal Process. Lett., vol. 12, no. 6, pp. 441–444, Jun. 2005.
 A. D. Ker, “A fusion of maximum likelihood and structural steganalysis,” in Proc. 9th Inf. Hiding Workshop, ser. Springer LNCS, 2007, vol. 4567, pp. 204–219.
 K. Lee, A. Westfeld, and S. Lee, “Generalised category attack—Improving histogram-based attack on JPEG LSB embedding,” Inf.Hiding’07, pp. 378–391, 2007.
 J. Fridrich and M. Goljan, “On estimation of secret message length in LSB steganography in spatial domain,” in Secur., Steganogr. Watermarkingof Multimed. Contents VI, ser. Proc. SPIE, 2004, vol. 5306,pp. 23–34
Keywords:-Steganography, DWT, LSB, Micro Blaze, FPGA.