International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 6 | Number 1 | Year 2013 | Article Id. IJCTT-V6N1P102 | DOI : https://doi.org/10.14445/22312803/IJCTT-V6N1P102

FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor


B.Vasantha Lakshmi, B.Vidheya Raju

Citation :

B.Vasantha Lakshmi, B.Vidheya Raju, "FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor," International Journal of Computer Trends and Technology (IJCTT), vol. 6, no. 1, pp. 6-14, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V6N1P102

Abstract

We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with high degree of data integrity. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden information in the cover file. This paper explains the LSB Embedding technique with lifting based DWT schemes by using Micro blaze Processor implemented in a FPGA using System C coding.

Keywords

Steganography, DWT, LSB, Micro Blaze, FPGA.

References

[1] Pfitzmann Birgit. Information Hiding Terminology, First Workshop, International Cambridge, UK, Proceedings, Computer Science, 1174. pp. 347-350, May–June.
[2]  Westfield Attacks   Third Andre as and  Andreas Pfitzman n, on   Steganographic   Systems,   International Workshop, IH'99 Dresden October Computer   Proceeding s, 1768. Germany , Science pp. 61- 76, 1999. 
[3] Moerland,  T., “Steganography  and Steganalysis”,  Leiden Institute of Advanced Computing Science,Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999
[4] Wei Zhang,Zhe Jiang,Zhiyu Gao, and Yanyan Liu,”An efficient VLSI architecture for Lifting based discrete wavelet transform,”IEEE Trans.Circuits and systems,vol.59,NO.3,pp. 158-162,Mar.2012. 
[5] G. Xing, J. Li, and Y. Q. Zhang, “Arbitrarily shaped videoobject coding by wavelet,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 10,pp. 1135–1139, Oct. 2001.
[6] S. C. B. Lo, H. Li, and M. T. Freedman, “Optimization of wavelet decomposition for image compression and feature preservation,” IEEE Trans.Med. Imag., vol. 22, no. 9, pp. 1141–1151, Sep. 2003. 
[7] K. K. Parhi and T. Nishitani, “VLSI architecture for discrete wavelet transforms,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 1, no. 2, pp. 191202, Jun. 1993. 
[8] X. X. Qin and M. Wang, “A review on detection of LSB matching steganography,” Inf. Technol. J., vol. 9, pp. 1725–1738, 2010.
[9] A. D. Ker, “Locating steganographic payload via WS residuals,” inACM Proc. 10th Multimed. Secur. Workshop, 2008, pp. 27–31. [10] A. D. Ker, “A general framework for the structural steganalysis of LSBreplacement,” in Proc. 7th Inf. Hiding Workshop, ser. Springer LNCS, 2005, vol. 3727, pp. 296–311.
[11] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color and grayscale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, 2001.
[12] S. Dumitrescu, X.Wu, and Z.Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Trans. Signal Process., vol. 51, pp.1995–2007, Jun. 2003.
[13] A. Ker, “Steganalysis of LSB matching in grayscale images,” Signal Process. Lett., vol. 12, no. 6, pp. 441–444, Jun. 2005.
[14] A. D. Ker, “A fusion of maximum likelihood and structural steganalysis,” in Proc. 9th Inf. Hiding Workshop, ser. Springer LNCS, 2007, vol. 4567, pp. 204219.
[15] K. Lee, A. Westfeld, and S. Lee, “Generalised category attack—Improving histogram-based attack on JPEG LSB embedding,” Inf.Hiding’07, pp. 378–391, 2007.
[16] J. Fridrich and M. Goljan, “On estimation of secret message length in LSB steganography in spatial domain,” in Secur., Steganogr. Watermarkingof Multimed. Contents VI, ser. Proc. SPIE, 2004, vol. 5306,pp. 23–34