Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2014 | Volume: 6 | Issue: 3 | Page No.: 188-197
DOI: 10.3923/rjit.2014.188.197
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Space Filling Curve for Data Filling: An Embedded Security Approach

Siva Janakiraman, K. Thenmozhi, Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Abstract:
Embedded devices have taken a prominent role in today’s data communication. Steganography, an ancient method has immense budding to shield electronic data from threats in the modern world. The focus on this study is to make use of Hilbert Space Filling Curve (SFC) to implement random steganography on a single chip embedded device that embeds textual information on grey scale images. The written embedded C program was optimized for in terms of code size and execution time and the results are compared. The results of the proposed method are also compared with a similar methodology hosted on an equivalent embedded device. The main aim of this implementation is to make use of the specialized bit operation capabilities of ARM processor to improve the security level of the embedding algorithm by introducing bit level arbitrariness in the selection of data to be embedded.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Audio Fingerprint Indicator in Embedded Platform: A Way for Hardware Steganography
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Steganography-Time to Time: A Review
How to cite this article:

Siva Janakiraman, K. Thenmozhi, Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2014. Space Filling Curve for Data Filling: An Embedded Security Approach. Research Journal of Information Technology, 6: 188-197.

DOI: 10.3923/rjit.2014.188.197

URL: https://scialert.net/abstract/?doi=rjit.2014.188.197

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom