Skip to main content
Log in

Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Exploiting modification direction (EMD)-based image steganography algorithm has higher embedding efficiency, low distortion, and best security that finds application in secure communication, data protection, access control in digital content distribution, etc., EMD steganography encapsulates secret digit represented in (2n + 1)-ary notational system by increasing or decreasing one of the n cover pixels by one. New high-speed reconfigurable architectures and field programmable gate array (FPGA) implementation of EMD based image steganography algorithms have been proposed. Although, earlier work on FPGA implementation of steganography algorithms offer higher speed, low chip area, and better throughput it usually operates on a fixed number of pixels. The proposed system works well for both arbitrary numbers of pixel groups and variable image resolution. The developed system is capable of embedding a secret message from two to eight-pixel groups with an image resolution of 512 × 512 pixels at a real-time video rate of 549 frames/s.. The complete design is implemented using RTL compliant Verilog code which fits into a single FPGA/ASIC chip with a gate density of two million gates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

References

  1. Biswapati J, Debasis G, Kumar MS (2017) Dual-image based reversible data hiding scheme through pixel value differencing with exploiting modification direction. In: Proceedings of the first international conference on intelligent computing and communication. Springer, Singapore

    Google Scholar 

  2. Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non-blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973–7987

    Article  Google Scholar 

  3. Denemark T, Fridrich J (2017) Steganography with multiple JPEG images of the same scene. IEEE Transactions on Information Forensics and Security 12(10):2308–2319

    Article  Google Scholar 

  4. De-Sheng F, Jing Z-J, Zhao S-G, Fan J (2014) Reversible data hiding based on prediction-error histogram shifting and EMD mechanism. AEU Int J Electron Commun 68:933–943

    Article  Google Scholar 

  5. Dhawale CA, Jambhekar ND (2017) Digital image steganography. Advanced Image Processing Techniques and Applications

  6. Fridrich J, Pevny T, Kodovsky J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceeding 9th workshop on multimedia and security. ACM, New York, pp 3–14

    Google Scholar 

  7. Gómez-Hernández E, Feregrino-Uribe C, Cumplido R (2008) FPGA Hardware Architecture of the Steganographic Context Technique. IEEE 18th International Conference on Electronics, Communications and Computers, p 123–128

  8. Hong W, Chen T-S (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics and Security 7(1)

  9. W. James MacLean (2005) An Evaluation of the Suitability of FPGAs for Embedded Vision Systems. In: IEEE Computer Society Conference, Computer Vision and Pattern Recognition (CVPR) Workshops, p 131–131

  10. Jung K-H, Yoo K-Y (2009) Improved exploiting modification direction method by Modulus operation. International Journal of Signal Processing, Image Processing, and Pattern 2(1)

  11. Kasana G, Singh K, Bhatia SS (2017) EMD-based steganography techniques for JPEG-2000 encoded images. Int J Wavelets Multiresolution Inf Process 15(3):1750020

    Article  MathSciNet  Google Scholar 

  12. Kieu TD, Chang C-C (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38:10648–10657

    Article  Google Scholar 

  13. Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Journal of Computers & Mathematics with Applications 60(2):319–325

    Article  MathSciNet  MATH  Google Scholar 

  14. Kumar V, Kumar D (2017) A modified DWT-based image steganography technique. Multimed Tools Appl:1–30

  15. Lee C-F, Wang Y-R, Chang C-C (2007) A steganographic method with high embedding capacity by improving exploiting modification direction. IEEE Proceedings on Intelligent Information Hiding and Multimedia Signal Processing 1

  16. Li J-J, Wu Y-H, Lee C-F, Chang C-C (2018) Generalized PVO-K embedding technique for reversible data hiding. International Journal of Network Security 20(1):65–77

    Google Scholar 

  17. Manyika J, Chui M, Bughin J, Dobbs R, Bisson P, Marrs A (2013) Disruptive technologies: advances that will transform life, business, and the global economy. McKinsey Global Institute, San Francisco

    Google Scholar 

  18. Niu X, Ma M, Tang R, Yin Z (2015) Image steganography via fully exploiting modification direction. International Journal of Security and its Applications 9(5):243–254

    Article  Google Scholar 

  19. Omoomi M, Samavi S, Dumitrescu S (2011) An efficient high payload ±1 data embedding scheme. J Multimed Tools Appl 54:201–218

    Article  Google Scholar 

  20. Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. Research Advances in Integrated Navigation Systems (RAINS), IEEE, p 1–8

  21. Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. J Multimed Tools Appl 76(6):8627–8650

    Article  Google Scholar 

  22. Rajagopalan S, Amirtharajan R, Upadhyay HN, Rayappan JBB (2012) Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J Appl Sci 12:201–210

    Article  Google Scholar 

  23. Ramalingam B, Amirtharajan R, Rayappan JBB (2014) Stego on FPGA: an IWT approach. Sci World J 2014:192512, 9 pages. https://doi.org/10.1155/2014/192512

    Article  Google Scholar 

  24. Roy R, Changder S, Sarkar A, Debnath NC (2013) Evaluating Image Steganography Techniques: Future Research Challenges. International Conference on Computing, Management and Telecommunications (ComManTel 2013) [IEEE], pp. 309–314, January 21–24, 2013

  25. Safaa Younus Alsaffawi Z (2017) Image steganography by using exploiting modification direction and knight tour algorithm. Journal of Al-Qadisiyah for Computer Science and Mathematics 8(1):1–11

    Article  Google Scholar 

  26. Saidi M, Hermassi H, Rhouma R, Belghith S (2016) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76:1–18

    Google Scholar 

  27. Shet KS, Aswath AR, Hanumantharaju MC, Gao X-Z (July 2016) Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system. Multimed Tools Appl 76(11):13197–13219

    Article  Google Scholar 

  28. Sharma VK, Srivastava DK (2017) Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advanced encryption standard. Computing and Network Sustainability, Springer, Singapore 12:353–360

    Article  Google Scholar 

  29. Shen S-Y, Huang L-H (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. J Comput Secur 48:131–141

    Article  Google Scholar 

  30. Shih FY (2017) Multimedia security: watermarking, steganography, and forensics. CRC Press, Boca Raton

    Book  Google Scholar 

  31. Vallathan G, Balachandran K, Jayanthi K (2017) Enhanced data security and integrity using Contourlet transform for medical images. Indian J Sci Technol 10(8)

  32. Wang Z-H, Kieu TD, Chang CC, Li MC (2010) A novel information concealing method based on exploiting modification direction. Journal of Information Hiding and Multimedia Signal Processing 1(1):1–9

    Article  Google Scholar 

  33. Wang C-C, Kuo W-C, Huang Y-C, Wuu L-C (2017a) A high capacity data hiding scheme based on re-adjusted GEMD. J Multimed Tools Appl, ISSN: 1380–7501, p 1–15

  34. Wang Z, Yin Z, Zhang X (2017b) Distortion function for JPEG steganography based on image texture and correlation in DCT domain. IETE Technical Review, p 1–8

  35. Xu J, Zhang W, Jiang R, Hu X, Yu N (2017) Optimal structural similarity constraint for reversible data hiding. J Multimed Tools Appl 76(14):15491–15511

    Article  Google Scholar 

  36. Yao H, Qin C, Tang Z, Tiana Y (2017) Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion. Signal Process 135:26–35

    Article  Google Scholar 

  37. Zaidan BB, Zaidan AA (2017) Software and hardware FPGA-based digital watermarking and steganography approaches: toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques. Journal of Circuits, Systems, and Computers 26(7):1750116

    Article  Google Scholar 

  38. Zhang X, Wang S (Nov. 2006) Efficient Steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  39. Zhou H, Chen K, Zhang W, Yu N (2017a) Comments on steganography using reversible texture synthesis. IEEE Trans Image Process 26(4):1623–1625

    Article  MathSciNet  MATH  Google Scholar 

  40. Zhou W, Zhang W, Yu N (2017b) A new rule for cost reassignment in adaptive steganography. IEEE Transactions on Information Forensics and Security 12(11):2654–2667

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sathish Shet.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shet, K.S., Aswath, A.R., Hanumantharaju, M.C. et al. Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography. Multimed Tools Appl 78, 18309–18338 (2019). https://doi.org/10.1007/s11042-019-7187-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7187-2

Keywords

Navigation