Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA

[1]  Rengarajan Amirtharajan,et al.  Horse Riding & Hiding in Image for Data Guarding , 2012 .

[2]  Hao Luo,et al.  Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification , 2012 .

[3]  K. Thenmozhi,et al.  Secret Link Through Simulink: A Stego on OFDM Channel , 2014 .

[4]  K. Thenmozhi,et al.  Reversible Steganography on OFDM Channel-A Role of RS Coding , 2014 .

[5]  Kiyoshi Tanaka,et al.  A DCT-based Mod4 steganographic method , 2007, Signal Process..

[6]  John Bosco Balaguru Rayappan,et al.  Stego on Song-an Amalgam of vi and FPGA for Hardware Info Hide , 2014 .

[7]  K. Thenmozhi,et al.  Reversible Steganography on OFDM Channel: A Role of Cyclic Codes , 2014 .

[8]  J. Rayappan,et al.  Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision , 2011 .

[9]  K. Thenmozhi,et al.  Double Layer Encoded Encrypted Data on Multicarrier Channel , 2014 .

[10]  K. Thenmozhi,et al.  Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .

[11]  S. Wolfram Statistical mechanics of cellular automata , 1983 .

[12]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[13]  Hao Luo,et al.  Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission , 2011 .

[14]  R Sundararaman,et al.  Stego System on Chip with LFSR based Information Hiding Approach , 2011 .

[15]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[16]  M. M. Ari,et al.  Evaluation of the Chemical Composition and Anti Nutritional Factors Levels of Different Thermally Processed Soybeans , 2012 .

[17]  K. Thenmozhi,et al.  Inserted Embedding in OFDM Channel: A Multicarrier Stego , 2014 .

[18]  K. Thenmozhi,et al.  Can we Reduce PAPR? OFDM+PTS+SLM+STEGO: A Novel Approach , 2013 .

[19]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[20]  Rengarajan Amirtharajan,et al.  Phase for Face saving-a multicarrier Stego , 2012 .

[21]  Rengarajan Amirtharaj,et al.  Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .

[22]  John Bosco Balaguru Rayappan,et al.  Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .

[23]  Othman Omran Khalifa,et al.  A review on multimedia communications cryptography , 2011 .

[24]  K. Thenmozhi,et al.  Spread and Hide-A Stego Transceiver , 2014 .

[25]  K. Thenmozhi,et al.  Stego in Multicarrier: A Phase Hidden Communication , 2014 .

[26]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[27]  John Bosco Balaguru Rayappan,et al.  High Capacity Triple Plane Embedding: A Colour Stego , 2013 .

[28]  John Bosco Balaguru Rayappan,et al.  Seeing and Believing is a Threat: A Visual Cryptography Schemes , 2013 .

[29]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[30]  K. Thenmozhi,et al.  OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .

[31]  John Bosco Balaguru Rayappan,et al.  Pixel Indicates, Standard Deviates: A Way for Random Image Steganography , 2013 .

[32]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[33]  K. Thenmozhi,et al.  Purposeful Error on OFDM: A Secret Channel , 2014 .

[34]  K. Thenmozhi,et al.  Data Puncturing in OFDM Channel: A Multicarrier Stego , 2014 .

[35]  John Bosco Balaguru Rayappan,et al.  Kubera Kolam: A Way for Random Image Steganography , 2013 .

[36]  K. Thenmozhi,et al.  Regulated OFDM-Role of ECC and ANN: A Review , 2012 .

[37]  K. Thenmozhi,et al.  Hide and seek in silicon - Performance analysis of Quad block Equisum Hardware Steganographic systems , 2012 .

[38]  John Bosco Balaguru Rayappan,et al.  Gyratory Assisted Info Hide-A Nibble Differencing for Message Embedding , 2014 .

[39]  John Bosco Balaguru Rayappan,et al.  Modeling Combo PR Generator for Stego Storage Self Test (SSST) , 2014 .

[40]  J. Rayappan,et al.  Multi (Carrier+Modulator) Adaptive System-an Anti Fading Stego Approach , 2014 .

[41]  K. Thenmozhi,et al.  Captivating CODEC Stego (CCS): A Cover on Camouflage , 2013 .

[42]  John Bosco Balaguru Rayappan,et al.  Pixel Indicated Triple Layer: A Way for Random Image Steganography , 2013 .

[43]  John Bosco Balaguru Rayappan,et al.  Steganography-Time to Time: A Review , 2013 .

[44]  Xingming Sun,et al.  An Excellent Image Data Hiding Algorithm Based on BTC , 2011 .

[45]  John Bosco Balaguru Rayappan,et al.  Pixel Indicated User Indicator: A Muxed Stego , 2013 .

[46]  Rengarajan Amirtharaj,et al.  Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .

[47]  John Bosco Balaguru Rayappan,et al.  Cover as Key and Key as Data: An Inborn Stego , 2014 .

[48]  Rengarajan Amirtharaj,et al.  Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .

[49]  John Bosco Balaguru Rayappan,et al.  Mind Game for Cover Steganography: A Refuge , 2013 .

[50]  Rengarajan Amirtharaj,et al.  A New Steganography Algorithm against Chi Square Attack , 2013 .

[51]  John Bosco Balaguru Rayappan,et al.  Rubik's Cube: A Way for Random Image Steganography , 2013 .

[52]  K. Thenmozhi,et al.  Firmware for Data Security: A Review , 2012 .

[53]  Balakrishnan Ramalingam,et al.  LCC-LSB-FPGA Stego-A Reconfigurable Security , 2014 .

[54]  K. Thenmozhi,et al.  Humming Bird with Coloured Wings: A Feedback Security Approach , 2014 .

[55]  Jiaohua Qin,et al.  Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .

[56]  John Bosco Balaguru Rayappan,et al.  MSB Based Embedding with Integrity: An Adaptive RGB Stego on FPGA Platform , 2014 .

[57]  J. Rayappan,et al.  Coded Crypted Converted Hiding (C3H)-A Stego Channel , 2014 .

[58]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[59]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[60]  John Bosco Balaguru Rayappan,et al.  High Performance Pixel indicator For Colour Image Steganography , 2013 .

[61]  John Bosco Balaguru Rayappan,et al.  Why Image Encryption for Better Steganography , 2013 .