Fast real-time hardware engine for ZWC text steganography

Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementation to embed secret data inside the carrier file. This is while software implementations are not sufficiently fast for real-time applications. In this paper, we present a new real-time zero-width-character (ZWC) Steganography technique to hide data inside a text file using a hardware engine with 6.415Gbps hidden data rate. The fast Steganography implementation is presented in this paper.

[1]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[2]  Ahlam Fadhil Mahmood,et al.  An FPGA Implementation of Secured Steganography Communication System , 2014 .

[3]  Jawdat K. Al-Tirkity,et al.  Bearing Capacity of Eccentrically Loaded Strip Footing on Geogrid Reinforced Sand , 2012 .

[4]  Elizabeth Chang,et al.  Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .

[5]  Abdulaleem Z. Al-Othmani,et al.  A survey on steganography techniques in real time audio signals and evaluation , 2012 .

[6]  Anupama,et al.  INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY , 2011 .

[7]  Lee-Ming Cheng,et al.  Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[8]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[9]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[10]  Claudia Feregrino Uribe,et al.  FPGA Hardware Architecture of the Steganographic ConText Technique , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[11]  Ismail Avcibas,et al.  Steganalytic Features for JPEG Compression-Based Perturbed Quantization , 2007, IEEE Signal Processing Letters.

[12]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[13]  B. J. Mohd,et al.  FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[14]  Magdy Saeb,et al.  Design and implementation of a secret key steganographic micro-architecture employing FPGA , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[15]  Pradeep Kumar Singh,et al.  A Survey on Text Based Steganography , 2009 .