Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 160-170
DOI: 10.17311/rjit.2013.160.170
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Captivating CODEC Stego (CCS): A Cover on Camouflage

Siva Janakiraman, Sundararaman Rajagopalan, K. Thenmozhi, Har Narayan Upadhyay, Janani Ramanathan, Swetha Varadarajan, J.B.B. Rayappan and Rengarajan Amirtharajan

Abstract:
One year’s seeds, seven year's weeds’ is precisely pointed out by the proverb to highlight the importance of doing things, not too late. Even though, this Anglo Saxon work ethic is directed towards the must attitude for workmanship, the importance of this proverb for information security is phenomenal. Secure information sharing needs novel ideas and techniques to impede the incoming threats of secret drop outs. Steganography, an information hiding approach has seen a variety of flavours in terms of domains, algorithms, platforms etc. We present an information hiding approach on hardware platform where Field Programmable Gate Array (FPGA) works out a spatial domain steganographic module with fixed k-bit embedding and adaptive picture element position p where -1<P<4 and gray scale change factor C falling between 0<C<3. This stego algorithm on programmable logic hides the secret message bits in the cover image stored in External SRAM through a convolution encoder which employs a triple XOR logic for encoded message creation to enhance the imperceptibility with higher embedding capacity.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
How to cite this article:

Siva Janakiraman, Sundararaman Rajagopalan, K. Thenmozhi, Har Narayan Upadhyay, Janani Ramanathan, Swetha Varadarajan, J.B.B. Rayappan and Rengarajan Amirtharajan, 2013. Captivating CODEC Stego (CCS): A Cover on Camouflage. Research Journal of Information Technology, 5: 160-170.

DOI: 10.17311/rjit.2013.160.170

URL: https://scialert.net/abstract/?doi=rjit.2013.160.170

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom