Fast real-time hardware engine for Multipoint Text Steganography

Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementation to embed secret data inside the carrier file. Most software implementations are not sufficiently fast for real-time applications. In this paper, we present a new real-time Steganography technique to hide data inside a text file using a hardware engine with 11.27 Gbps hidden data rate. The fast Steganography implementation is presented in this paper.

[1]  Lee-Ming Cheng,et al.  Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[2]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[3]  M. Saeb,et al.  DESIGN AND IMPLEMENTATION OF A SECRET KEY STEGANOGRAPHIC MICROARCHITECTURE EMPLOYING FPGA , 2003 .

[4]  Magdy Saeb,et al.  Design and implementation of a secret key steganographic micro-architecture employing FPGA , 2004 .

[5]  Abdulaleem Z. Al-Othmani,et al.  A survey on steganography techniques in real time audio signals and evaluation , 2012 .

[6]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[7]  Jessica J. Fridrich,et al.  Perturbed quantization steganography , 2005, Multimedia Systems.

[8]  Pradeep Kumar Singh,et al.  A Survey on Text Based Steganography , 2009 .

[9]  Anupama,et al.  INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY , 2011 .

[10]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[11]  Ismail Avcibas,et al.  Steganalytic Features for JPEG Compression-Based Perturbed Quantization , 2007, IEEE Signal Processing Letters.

[12]  K. Elleithy,et al.  Steganography by multipoint Arabic letters , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[13]  B. J. Mohd,et al.  FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[14]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[15]  Elizabeth Chang,et al.  Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .

[16]  Claudia Feregrino Uribe,et al.  FPGA Hardware Architecture of the Steganographic ConText Technique , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[17]  Ahlam Fadhil Mahmood,et al.  An FPGA Implementation of Secured Steganography Communication System , 2014 .

[18]  Jawdat K. Al-Tirkity,et al.  Bearing Capacity of Eccentrically Loaded Strip Footing on Geogrid Reinforced Sand , 2012 .