CFP last date
20 January 2025
Reseach Article

Improved FPGA based X-Box Mapping of an Image using Steganography Technique

Published on June 2016 by Puja Mahajan, Prajakta Nimbalkar, Pratiksha Pawar
National Conference on Advances in Computing, Communication and Networking
Foundation of Computer Science USA
ACCNET2016 - Number 4
June 2016
Authors: Puja Mahajan, Prajakta Nimbalkar, Pratiksha Pawar
298dc03e-2424-4f66-a42e-f76051c6caa5

Puja Mahajan, Prajakta Nimbalkar, Pratiksha Pawar . Improved FPGA based X-Box Mapping of an Image using Steganography Technique. National Conference on Advances in Computing, Communication and Networking. ACCNET2016, 4 (June 2016), 1-4.

@article{
author = { Puja Mahajan, Prajakta Nimbalkar, Pratiksha Pawar },
title = { Improved FPGA based X-Box Mapping of an Image using Steganography Technique },
journal = { National Conference on Advances in Computing, Communication and Networking },
issue_date = { June 2016 },
volume = { ACCNET2016 },
number = { 4 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/accnet2016/number4/24988-2278/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing, Communication and Networking
%A Puja Mahajan
%A Prajakta Nimbalkar
%A Pratiksha Pawar
%T Improved FPGA based X-Box Mapping of an Image using Steganography Technique
%J National Conference on Advances in Computing, Communication and Networking
%@ 0975-8887
%V ACCNET2016
%N 4
%P 1-4
%D 2016
%I International Journal of Computer Applications
Abstract

Image steganography is a method of keeping the data in another image that will be recognized only by the recipient who will be receiving this data. No one is able to treasure the original data, only recipient can. Here, an improved version of X- box mapping for an image using steganography technique is presented[1]. Steganography is the way of keeping data or information in an image which cannot be seen by naked eyes. Only the recipient knows where the data is. Least Significant-Bit (LSB) is most famous technique used in steganography techniques as it is easy and has large covering capacity. X-Box technique is only used for inserting different values. In this mapping method, X-Box will give safety of values and these values will be stored in random manner and that cannot be detected.

References
  1. Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang "A Strategy of Clustering Modification Directions in Spatial Image Steganography", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 10 (9) (2015) , pp. 1905-1917.
  2. EktaDagar, Sunny Dagar, "LSB Based Image Steganography Using X-Box Mapping", International Conference on Advances in Computing, Communications and Informatics (ICACCI), ( 2014) 351-355.
  3. Mr. Jagdish . D. H, Mrs. Manjula. Y. , Dr. M. Z. Kurian, "FPGA Implementation of X-BOX for an Image Steganography Technique", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engg. , Vol-2, Issue 6, June 2013.
  4. Amitava Nag, Swati Ghosh, SushantBiswas, DebashreeSarkar, ParhaPratimSarkar, " An Image Steganography Technique using X-Box Mapping", IEEE- International Conference on Advances in Engg. , Science and management(2012) 709- 713.
  5. Morland . T. , "Steganography and Steganalysis", Leiden Institute of Advanced computing Science, www. liacs. nl/home/tmoerl/private. pdf.
  6. BassamJamilMohd. , Saed Abed and Thaier Al-Hayajneh, Sahel Alouneh, "FPGA Hardware of the LSB Steganography Method", 978-1-4673-1550-0/12/$31. 00©2012 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Technique X-box Mapping Method Stego Image Lsb Technique Information Hiding.