Log In Sign Up

Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem

by   Salah Harb, et al.

In this paper, a novel and efficient hardware implementation of steganographic cryptosystem based on a public-key cryptography is proposed. Digital images are utilized as carriers of secret data between sender and receiver parties in the communication channel. The proposed public-key cryptosystem offers a separable framework that allows to embed or extract secret data and encrypt or decrypt the carrier using the public-private key pair, independently. Paillier cryptographic system is adopted to encrypt and decrypt pixels of the digital image. To achieve efficiency, a proposed efficient parallel montgomery exponentiation core is designed and implemented for performing the underlying field operations in the Paillier cryptosystem. The hardware implementation results of the proposed steganographic cryptosystem show an efficiency in terms of area (resources), performance (speed) and power consumption. Our steganographic cryptosystem represents a small footprint making it well-suited for the embedded systems and real-time processing engines in applications such as medical scanning devices, autopilot cars and drones.


page 9

page 10


Breaking the Hidden Irreducible Polynomials Scheme

In 2019 Gómez described a new public key cryptography scheme based on id...

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...

New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem

A verifiable multi-secret sharing (VMSS) scheme enables the dealer to sh...

The Reincarnation of Grille Cipher

In order to keep the data secret, various techniques have been implement...

Post Quantum Cryptography: Readiness Challenges and the Approaching Storm

While advances in quantum computing promise new opportunities for scient...

A Memristive Based Design of a Core Digital Circuit for Elliptic Curve Cryptography

The new emerging non-volatile memory (NVM) devices known as memristors c...

SideLine: How Delay-Lines (May) Leak Secrets from your SoC

To meet the ever-growing need for performance in silicon devices, SoC pr...