27-03-2017, 03:38 PM
The inclusion and extraction processes in the proposed algorithms are performed by MATLAB and are implemented in a field programmable gate array (FPGA) using the Xilinx (XSG) system based on Hardware / Software Cosimulation. The implementation of proposed algorithms in FPGA has the advantages of using embedded multipliers and large memory. The mean square error (MSE) and peak-to-noise signal (PSNR) are used to check and measure the statistical distortion between the cover image and stegoimage, while normalized cross-correlation (NCC) is used to evaluate the Degree of closeness between them. The experimental results are showing the efficiency of proposed algorithms as well as showing that incorporating larger data sizes with better MSE and PSNR results.
There are a large number of data hiding techniques that can be used to hide a secret text inside a digital image. Image steatography is one of the most widely accepted data hiding techniques. The word steganography is derived from the Greek words "steganos" meaning "covered" and "graphie" which means "to write" which defines it as "writing covered". Steganography deals with transmitting a secret message and hiding its existence. It is the art and science of embedding a secret text into a cover image without leaving a noticeable clue in the cover image. The secret text is hidden in the cover image and the resulting image is called "stego image". The stego-image is passing through a communication channel. At the reception, a pre-processing step is applied to the received stego image, then the secret text can be extracted from it. There are two general approaches to categorizing systems of steganography techniques. Depending on the type of cover object, steganography techniques are classified into image steganography, video steganography, network steganography, text steganography and audio steganography. According to the inclusion techniques, steganography techniques are classified into six main types that are inserted into the spatial domain, such as LSB (Less Significant Bit) approaches and approaches based on the differentiation of values (PVD) such as Discrete Cosine Transformation (DCT) and Discrete Wavelet Transformation (DWT), spread spectrum techniques, distortion techniques, masking and filtration techniques, and coverage generation techniques. This paper focuses on an image steganography algorithm based on LSB in the spatial domain, since it is considered as one of the famous approaches in the spatial domain that is used to embed the existence of the secret text in a cover image in the That the LSBs of a cover image are changed according to the bit sequence of the secret text to be hidden.
There are a large number of data hiding techniques that can be used to hide a secret text inside a digital image. Image steatography is one of the most widely accepted data hiding techniques. The word steganography is derived from the Greek words "steganos" meaning "covered" and "graphie" which means "to write" which defines it as "writing covered". Steganography deals with transmitting a secret message and hiding its existence. It is the art and science of embedding a secret text into a cover image without leaving a noticeable clue in the cover image. The secret text is hidden in the cover image and the resulting image is called "stego image". The stego-image is passing through a communication channel. At the reception, a pre-processing step is applied to the received stego image, then the secret text can be extracted from it. There are two general approaches to categorizing systems of steganography techniques. Depending on the type of cover object, steganography techniques are classified into image steganography, video steganography, network steganography, text steganography and audio steganography. According to the inclusion techniques, steganography techniques are classified into six main types that are inserted into the spatial domain, such as LSB (Less Significant Bit) approaches and approaches based on the differentiation of values (PVD) such as Discrete Cosine Transformation (DCT) and Discrete Wavelet Transformation (DWT), spread spectrum techniques, distortion techniques, masking and filtration techniques, and coverage generation techniques. This paper focuses on an image steganography algorithm based on LSB in the spatial domain, since it is considered as one of the famous approaches in the spatial domain that is used to embed the existence of the secret text in a cover image in the That the LSBs of a cover image are changed according to the bit sequence of the secret text to be hidden.