Software and hardware-based audio-video crypto steganalysis model for enhancing robustness and imperceptibility of secured data

[1]  Ching-Nung Yang,et al.  Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code , 2020, Applied Sciences.

[2]  P. V. Powar,et al.  Implementation of Digital Video Watermarking Scheme Based on FPGA , 2020 .

[3]  Ching-Nung Yang,et al.  High-Capacity Data Hiding for ABTC-EQ Based Compressed Image , 2020, Electronics.

[4]  S. K. Moon,et al.  Hardware-based application of data security system using general modified secured diamond encoding embedding approach for enhancing imperceptibility and authentication , 2019, Multimedia Tools and Applications.

[5]  Sa'ed Abed,et al.  An Automated Security Approach of Video Steganography-Based LSB Using FPGA Implementation , 2019, J. Circuits Syst. Comput..

[6]  Mukesh Dalal,et al.  A robust and imperceptible steganography technique for SD and HD videos , 2019, Multimedia Tools and Applications.

[7]  Sunil K. Moon,et al.  Innovative data security model using forensic audio video steganography for improving hidden data security and robustness , 2018, Int. J. Inf. Comput. Secur..

[8]  Mamta Juneja,et al.  A robust and imperceptible steganography technique for SD and HD videos , 2018, Multimedia Tools and Applications.

[9]  Cheng-Yuan Chang,et al.  Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography , 2018 .

[10]  Safey A. S. Abdelwahab,et al.  FPGA implementation of image steganography algorithms using generalized exploiting modification direction and pixel segmentation strategy , 2018, 2018 35th National Radio Science Conference (NRSC).

[11]  Sanket N Shettar,et al.  Implementation of Image Steganography using LabVIEW , 2017 .

[12]  Kulbir Singh,et al.  Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform , 2017, J. Inf. Process. Syst..

[13]  B. B. Gupta,et al.  A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.

[14]  Md. Mokammel Haque,et al.  An improved steganographic technique based on diamond encoding method , 2017, 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE).

[15]  Ramadhan J. Mstafa,et al.  Compressed and raw video steganography techniques: a comprehensive survey and analysis , 2017, Multimedia Tools and Applications.

[16]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.

[17]  Amit Kumar,et al.  Implementation of advanced steganography with higher security using LabVIEW , 2016, CSI Transactions on ICT.

[18]  Samer H. Atawneh,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2016, Multimedia Tools and Applications.

[19]  E. A. El-shazly,et al.  FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain , 2016 .

[20]  Athanasios V. Vasilakos,et al.  A comparative study of steganography designs based on multiple FPGA platforms , 2016, Int. J. Electron. Secur. Digit. Forensics.

[21]  Ching-Nung Yang,et al.  Lossless data hiding for absolute moment block truncation coding using histogram modification , 2016, Journal of Real-Time Image Processing.

[22]  Shahidan M. Abdullah,et al.  A robust video watermarking technique for the tamper detection of surveillance systems , 2016, Multimedia Tools and Applications.

[23]  Sunil K. Moon,et al.  Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility , 2015, Int. J. Electron. Secur. Digit. Forensics.

[24]  A. Ravi Sankar,et al.  FPGA implementation of data hididng in grayscale imagesusing neighbour mean interpolation , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[25]  Wen-Chung Kuo,et al.  A Formula Diamond Encoding Data Hiding Scheme , 2015, J. Inf. Hiding Multim. Signal Process..

[26]  Nenghai Yu,et al.  Defining embedding distortion for motion vector-based video steganography , 2015, Multimedia Tools and Applications.

[27]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[28]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[29]  Mohammad Riyas,et al.  Hardware Implementation of a Digital Watermarking System Using 3d Dct , 2014 .

[30]  Sunil K. Moon,et al.  Analysis of secured video steganography using computer forensics technique for enhance data security , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[31]  Lilian Bossuet,et al.  Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip , 2013, CSUR.

[32]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[33]  V. Vijayalakshmi,et al.  Color Image Steganography based on Pixel Value Modification Method Using Modulus Function , 2013 .

[34]  L. H. Ho,et al.  Adaptive local complexity controlled data hiding method considering the human visual sensitivity , 2012 .

[35]  B. J. Mohd,et al.  FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[36]  Tung-Shou Chen,et al.  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.

[37]  K. Thenmozhi,et al.  Hide and seek in silicon - Performance analysis of Quad block Equisum Hardware Steganographic systems , 2012 .

[38]  Claudia Feregrino Uribe,et al.  On the Implementation of a Hardware Architecture for an Audio Data Hiding System , 2011, J. Signal Process. Syst..

[39]  Cheng-Hsing Yang,et al.  Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.

[40]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[41]  Ahmed H. Madian,et al.  Hardware realization of DC embedding video watermarking technique based on FPGA , 2010, 2010 International Conference on Microelectronics.

[42]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[43]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[44]  Tomás Pevný,et al.  Modern steganalysis can detect YASS , 2010, Electronic Imaging.

[45]  Jason Helge Anderson,et al.  A PUF design for secure FPGA-based embedded systems , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).

[46]  Yen-Ping Chu,et al.  A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..

[47]  Jong-Nam Kim,et al.  FPGA based implementation of real-time watermarking for high definition video , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[48]  A. A. Zaidan,et al.  "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[49]  B. B. Zaidan,et al.  Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[50]  Fazida Othman,et al.  Stego-Image vs Stego-Analysis System , 2009 .

[51]  Bilal Zaidan,et al.  Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.

[52]  Sanjay N. Talbar,et al.  FPGA Implementation of Image Adaptive Watermarking Using Human Visual Model , 2009 .

[53]  Jürgen Teich,et al.  Power Signature Watermarking of IP Cores for FPGAs , 2008, J. Signal Process. Syst..

[54]  Lee-Ming Cheng,et al.  Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[55]  Jonathan Rose,et al.  Measuring the Gap Between FPGAs and ASICs , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[56]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[57]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[58]  M. Saeb,et al.  Design and implementation of a secret key steganographic micro-architecture employing FPGA , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[59]  Gang Qu,et al.  Zero overhead watermarking technique for FPGA designs , 2003, GLSVLSI '03.