CFP last date
20 January 2025
Reseach Article

FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain

by E. A. Elshazly, Safey A. S. Abdelwahab, R. M. Fikry, S. M. Elaraby, O. Zahran, M. El-Kordy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 12
Year of Publication: 2016
Authors: E. A. Elshazly, Safey A. S. Abdelwahab, R. M. Fikry, S. M. Elaraby, O. Zahran, M. El-Kordy
10.5120/ijca2016910796

E. A. Elshazly, Safey A. S. Abdelwahab, R. M. Fikry, S. M. Elaraby, O. Zahran, M. El-Kordy . FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain. International Journal of Computer Applications. 145, 12 ( Jul 2016), 43-52. DOI=10.5120/ijca2016910796

@article{ 10.5120/ijca2016910796,
author = { E. A. Elshazly, Safey A. S. Abdelwahab, R. M. Fikry, S. M. Elaraby, O. Zahran, M. El-Kordy },
title = { FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 12 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 43-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number12/25334-2016910796/ },
doi = { 10.5120/ijca2016910796 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:41.016763+05:30
%A E. A. Elshazly
%A Safey A. S. Abdelwahab
%A R. M. Fikry
%A S. M. Elaraby
%A O. Zahran
%A M. El-Kordy
%T FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 12
%P 43-52
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are many different data hiding techniques, the Least Significant Bit (LSB) based steganography algorithm is considered as one of the most popular algorithms in the spatial domain. In this paper, the proposed algorithm embeds data in each component of color image, where the signature of the transmitter and the length of the secret text are hidden in Red component, while the binary bit stream of the secret text is hidden in Green and Blue components of the color image. After embedding, the three components are re-combined to form a stego-image. The stego-image is passing through a communication channel and a noise may be added to it. At the receiver, the hidden text can be extracted from the noisy stego-image without any knowledge of the original image after applying a filtration in the pre-processing stage. The embedding and extracting processes in the proposed algorithms are performed using MATLAB and implemented on a field programmable gate array (FPGA) using Xilinx system generator (XSG) based on Hardware/Software Co-simulation. The implementation of the proposed algorithms on FPGA has the advantages of using an embedded multipliers and large memory. The Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) are used to check and measure the statistical distortion between the cover image and stego-image, while the Normalized Cross Correlation (NCC) is used to evaluate the degree of closeness between them. The experimental results are showing the efficiency of the proposed algorithms as well as proving that embedding larger size of data with better results of MSE and PSNR.

References
  1. Al-Korbi H. A., Al-Ataby A., Al-Taee M. A., Al-Nuaimy W., 2015. High-Capacity Image Steganography Based on Haar DWT for Hiding Miscellaneous Data. Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT). IEEE. 1 – 6, (Nov. 03 – 05) Amman. Jordan.
  2. Thangadurai K. and Sudha Devi G. 2014. An analysis of LSB based image steganography techniques. International Conference on Computer Communication and Informatics (ICCCI). IEEE. 1 – 4, (Jan. 03 – 05). Coimbatore. India.
  3. Kaul N. and Bajaj N. 2013. Audio in Image Steganography based on Wavelet Transform. International Journal of Computer Applications (IJCA). VOL. 79. No. 3. 7 – 10.
  4. Christaline J. A. and Vaishali D. 2011. Image Steganographic Techniques with Improved Embedding Capacity and Robustness. International Conference on Recent Trends in Information Technology (ICRTIT). IEEE. 97 – 101 (June 03 – 05). Chennai. Tamil Nadu.
  5. Singla D. and Juneja M. 2014. An Analysis of Edge Based Image Steganography Techniques in Spatial Domain. Recent Advances in Engineering and Computational Sciences (RAECS). IEEE. 1 – 5. (March 06 – 08). Chandigarh. India.
  6. Christe S. A. Vignesh M. and Kandaswamy A. 2011. An Efficient FPGA Implementation of MRI Image Filtering and Tumour Characterization Using Xilinx System Generator. International Journal of VLSI design & Communication Systems (VLSICS) VOL. 2. No. 4. 95 – 109.
  7. Sun H., Luo H., Tin-Yu Wu and Obaidat M. S. 2015. A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution. Global Communications Conference (GLOBECOM). IEEE. 1 – 7. (Dec. 06 – 10). San Diego. CA.
  8. Sujatha C. and Selvathi D. 2014. Hardware Implementation of Image Edge Detection Using Xilinx System Generator. Asian journal of scientific research. 1 – 11.
  9. Warkari D. S. and Kshirsagar U. A. 2015. FPGA Implementation of Point Processing Operation using Hardware Simulation. International Journal of Advanced Research in Computer and Communication Engineering, VOL. 4. Issue 4. 91 – 95.
  10. Dakre K. A. and Pusdekar P. N. 2015. Image Enhancement using Hardware co-simulation for Biomedical Applications. International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC). VOL. 3. Issue 2. 869 – 877.
  11. Yang C. Liu F. Luo X. and Zeng Y. 2013. Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. IEEE Transactions on Information Forensics and Security. VOL. 8. No. 1. 216 – 228.
  12. Joshci R. Gagnani L. and Pandey S. 2013. Image Steganography with LSB. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET). VOL. 2. Issue 1. 228 – 229.
  13. Deepa S. and Umarani R. 2013. A Study on Digital Image Steganography. International Journal of Advanced Research in Computer Science and Software Engineering. VOL. 3.  Issue 1.  54 – 57.
  14. Chen M-C, Agaian S. S. and Chen C. L. P. 2008. Generalized Collage Steganography on Images", International Conference on Systems, Man and Cybernetics (SMC). IEEE. 1043 – 1047. (Oct. 12 – 15). Singapore.
  15. Deshmukh P. U. and Pattewar T. M. 2014. A Novel Approach for Edge Adaptive Steganography on LSB Insertion Technique International Conference on Information Communication and Embedded Systems (ICICES). IEEE. 1 – 5 (Feb. 27 – 28). Chennai. India.
  16. Mandal J. K. and Das D. 2012. Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain. International Journal of Information Sciences and Techniques (IJIST). VOL. 2. No. 4. 83 – 93.
  17. Rawat D. and Bhandari V. 2013. Steganography Technique for Hiding Text Information in Color Image using Improved LSB Method. International Journal of Computer Applications (IJCA). VOL. 67. No. 1. 22 – 25.
  18. Rawat D. and Bhandari V. 2013. A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image. International Journal of Computer Applications (IJCA). VOL. 64. No. 20. 15 – 19.
  19. Yadav M., Yadav A. and Yadav P. 2014. Analysis of Various Image Steganography Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET). VOL. 2. Issue 2. 54 – 59.
  20. Mishra M. Routray A. R. and Kumar S. 2012. High Security Image Steganography with Modified Arnold’s Cat Map. International Journal of Computer Applications (IJCA). VOL. 37. No. 9. 16 – 20.
  21. Li L. Luo B. Li Q. and Fang X. 2009. A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator. International Conference on Multimedia Information Networking and Security (MINES '09). IEEE. VOL. 2. 118 – 121. (18 – 20 November). Hubei.
  22. Chawla G. Kamaldeep. Yadav R. and Ravi S. 2012. Analysis of Various Image Steganography Techniques on the Basis of Normalized Cross - Correlation (NCC). International Journal of Advanced and Innovative Research (IJAIR). VOL. 1. Issue 2.
  23. Juneja M. and Sandhu P. S. 2013. An Improved LSB based Steganography Technique for RGB Color Images. Second International Conference on Latest Computational Technologies (ICLCT-2013). 10 – 14, (June 17 – 18). London. UK.
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography  LSB MSE PSNR NCC MATLAB FPGA and XSG.