Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Journal of Applied Sciences
  Year: 2012 | Volume: 12 | Issue: 3 | Page No.: 201-210
DOI: 10.3923/jas.2012.201.210
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Sundararaman Rajagopalan, Rengarajan Amirtharajan, Har Narayan Upadhyay and John Bosco Balaguru Rayappan

Abstract:
Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the information but also contains the ways to save it, protect it and preserve it. The meaning of the proverb however stresses upon how to protect and secure information, as a small leakage will pave way for entire loss of information which should be protected. True, there have been various methods, approaches and algorithms proposed in the past and will emerge in future too in the areas of secure information transmission. Cryptography and steganography have been primary sources for information security. The bird’s eye view on the literature pertaining to the above mentioned two giants of information security spots a number of algorithms developed on both software as well as hardware platforms. This study does the survey from the literature on different cryptographic and image steganographic methods implemented on a reconfigurable hardware like FPGAs in the past. The analysis of various methods proposed earlier is also an important objective of this study.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Galois Field Proficient Product for Secure Image Encryption on FPGA
  •    Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
  •    Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
  •    Hardware/Software Co-Design Implementations of Elliptic Curve Cryptosystems
  •    High Performance Elliptic Curve GF(2m) Crypto-processor
  •    On the Capacity and Security of Steganography Approaches: An Overview
  •    Two-layer Cellular Automata Based Cryptography
How to cite this article:

Sundararaman Rajagopalan, Rengarajan Amirtharajan, Har Narayan Upadhyay and John Bosco Balaguru Rayappan, 2012. Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA. Journal of Applied Sciences, 12: 201-210.

DOI: 10.3923/jas.2012.201.210

URL: https://scialert.net/abstract/?doi=jas.2012.201.210

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

Curve Bottom