Wavelet-transform steganography: algorithm and hardware implementation Online publication date: Sat, 26-Jul-2014
by Bassam J. Mohd; Thaier Hayajneh; Ahmad Nahar Quttoum
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 5, No. 3/4, 2013
Abstract: Steganography is a powerful method to conceal the existence of secret data inside a cover object. The concealment steps are performed in the spatial domain and/or the transform domain such as wavelet transform. While it is harder to detect, the transform domain steganography involves complex computations. Hence implementing steganography in hardware improves the steganography system performance. The preservation of the entire secret information is one of the main challenges for the transform domain steganography. Errors, introduced by quantisation steps, destroy some of the embedded secret bits. In this paper, we present a novel algorithm to embed and extract the entire secret data in the Haar wavelet-based transform without any secret information loss. This is accomplished by special clipping mechanism as well as modifying the placement of the secret bit in the transform coefficients. The algorithm is implemented in an FPGA-based hardware, and its performance metrics are examined including resources utilisation, power, timing and energy.
Online publication date: Sat, 26-Jul-2014
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com