Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  FPGA Implementation of Image Steganography Using LSB and DWT  
  Authors : Kalpana Shete; Mangal Patil; J. S. Morbale
  Cite as:

 

Steganography is one of the most influential techniques to mask the presence of concealed secret information inside a cover image. Image steganography is the important technique as digital image files are the most significant cover objects for steganography. Various algorithms and techniques such as LSB Replacement and Discrete Wavelet Transform are used for processing the secret data. Results are obtained in terms of PSNR, MSE and BER design metrics for proposed system. Intensive computations are required for embedding secret information inside images, and thus designing steganography in hardware speeds up steganography. The design when implemented with FPGA Spartan 3A kit provides a least processing time, which might give a faster, programmable & commercial hardware solution for secure communication. Proposed algorithms produces PSNR between 42-46 dB for LSB and 49-55 dB for DWT.

 

Published In : IJCSN Journal Volume 4, Issue 6

Date of Publication : December 2015

Pages : 847- 853

Figures :09

Tables : 03

Publication Link : FPGA Implementation of Image Steganography Using LSB and DWT

 

 

 

Kalpana Shete : Dept. of Electronics, BVUCOE, Pune, Maharashtra, India

Mangal Patil : Dept. of Electronics, BVUCOE, Pune, Maharashtra, India

J. S. Morbale : Dept. of Electronics, BVUCOE, Pune, Maharashtra, India

 

 

 

 

 

 

 

Image Steganography

Discrete Wavelet Transform

FPGA

Least Significant Bit

In this paper the performance of image steganography is evaluated based on various metrics such as PSNR, MSE, BER and processing time. The proposed LSB replacement and DWT technique provides high PSNR and less MSE and BER values than previous methods. Proposed LSB algorithm produces PSNR in the range of 42-46 dB whereas DWT generates PSNR between 49-55dB. Spartan 3A development kit produces better performance in terms of processing time for same LSB and DWT algorithms. Future work should focus on hardware implementation based on various spatial and transform domain techniques to improve the robustness and image quality performance further, as well as minimizing the processing speed and power.

 

 

 

 

 

 

 

 

 

[1] Bassam Jamil Mohd, Saed Abed, Thaier Al-Hayajneh, Sahel Alounch, “FPGA Hardware of the LSB Steganography Method”, IEEE Transaction on consumer Electronics, vol. 978, no. 1, 2012, PP. 4673- 1550. [2] Mrs. Manjula Y, Mr. Jagadeesha D.H, Dr. K.B ShivaKumar, “FPGA Implementation of Image Stenography Technique Using X-Box Mapping”, International Journal of Computer & Organization Trends, Volume 3, Issue 6, June 2013. [3] Deepa S. and Sarankumar S., “Implementation of Image Steganography Using FPGA”, International Journal of Engineering Sciences and Research Technology, April 2014, pp. 5007-5011. [4] K. N. Pansare and Dr. A. K. Kureshi, “A Review– FPGA Implementation of Different Steganographic Technique”, International Journal of innovation Research in Science, Engineering and Technology, volume 3, special issue 4, April 2014. [5] Shivakumar K.B., Khasim T., Raja K.B., Pattanaik S., “Dual Transform Technique for Robust Steganography”, IEEE International Conference on Computational Intelligence and Communication Networks (CICN), 7-9 Oct. 2011, pp. 310 – 314. [6] Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, ELSEVIER, Signal Processing, 6th sept. 2009, pp. 727-752. [7] Vasntha Lakshmi and B. Vidheya Raju, “FPGA Implementation of lifting DWT based LSB steganography using micro blaze processor”, International journal of computer trends and technology (IJCTT), Volume 6, number 1, Dec 2013. [8] Ankita Ganorkar and Sujata Agrawal, “Implementation of Steganography on FPGA”, Ird India, Volume 2, Issue 1, January 2014. [9] P. Karthigaikumar, Anumol, K. Baskaran, “FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm”, SciVerse ScienceDirect, Procedia Engineering, 30(2012), pp. 266-273. [10] Maya C. S. and Sabarinath G., “An Optimized FPGA Implementation of LSB Replacement Steganography Using DWT”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, special issue 1, DEC 2013. [11] Edgar Gomez-Hernandez, Claudia Feregrino-Uribe, Rene Cumplido, “FPGA Hardware Architecture of the Steganographic ConText Technique”, IEEE Computer Society, 2008. [12] Dr. Ahlam Fadhil Mahmood, Nada Abdul Kanai and Sana Sami Mohmmad, “An FPGA Implementation of Secured Steganography Communication system”, Tikrit Journal of Engineering Science, vol. 19, No. 4, December 2012, pp. 14-23. [13] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, third edition, ISBN 978-81-317- 2695-2. [14] Suhad Shakir Jaber, Hilal Adnan Fadhil, Zahereel I. Abdul Khalib and Rasim Azeez Kadhim, “Survey on Recent Digital Image Steganography Techniques”, Journal of Theoretical and Applied Information Technology, Vol.66, No.3, 31st August 2014, pp. 714- 728. [15] Hala Farouk, Magdy Saeb, “Design and Implementation of Secret Key Stenographic Micro – Architecture Employing FPGA”, 1530-1591/04, 2004 IEEE. [16] Prabakaran G., Bhavani R., and Sankaran S., “Dual Wavelet Transform in Color Image Steganography Method”, IEEE International Conference on Electronics and Communication Systems (ICECS), 13- 14 Feb. 2014, pp. 1 – 6. [17] Farahani M.R.D. and Pourmohammad A., “A DWT Based Perfect Secure and High Capacity Image Steganography Method”, IEEE International conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), 16-18 Dec. 2013, pp. 314 – 317. [18] Narasimmalou T. and Joseph R.A., “Discrete Wavelet Transform based steganography for transmitting images”, IEEE International Conference on Advances in Engineering, Science and Management (ICAESM), 30-31 March 2012, pp. 370 – 375. [19] Chandran S., Bhattacharyya K., “Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography”, IEEE International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 24-25 Jan. 2015, pp. 1 – 5. [20] Kamila S., Roy R., Changder S., “A DWT based steganography scheme with image block partitioning”, IEEE 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 19-20 Feb. 2015, pp. 471 – 476.