Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem

06/04/2020
by   Salah Harb, et al.
0

In this paper, a novel and efficient hardware implementation of steganographic cryptosystem based on a public-key cryptography is proposed. Digital images are utilized as carriers of secret data between sender and receiver parties in the communication channel. The proposed public-key cryptosystem offers a separable framework that allows to embed or extract secret data and encrypt or decrypt the carrier using the public-private key pair, independently. Paillier cryptographic system is adopted to encrypt and decrypt pixels of the digital image. To achieve efficiency, a proposed efficient parallel montgomery exponentiation core is designed and implemented for performing the underlying field operations in the Paillier cryptosystem. The hardware implementation results of the proposed steganographic cryptosystem show an efficiency in terms of area (resources), performance (speed) and power consumption. Our steganographic cryptosystem represents a small footprint making it well-suited for the embedded systems and real-time processing engines in applications such as medical scanning devices, autopilot cars and drones.

READ FULL TEXT

page 9

page 10

research
11/05/2019

Breaking the Hidden Irreducible Polynomials Scheme

In 2019 Gómez described a new public key cryptography scheme based on id...
research
09/18/2023

Securing Fixed Neural Network Steganography

Image steganography is the art of concealing secret information in image...
research
06/17/2019

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...
research
08/29/2023

Area Efficient Modular Reduction in Hardware for Arbitrary Static Moduli

Modular reduction is a crucial operation in many post-quantum cryptograp...
research
04/18/2018

The Reincarnation of Grille Cipher

In order to keep the data secret, various techniques have been implement...
research
10/17/2015

Memory-Efficient Design Strategy for a Parallel Embedded Integral Image Computation Engine

In embedded vision systems, parallel computation of the integral image p...
research
03/16/2020

Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure

Mathematically-secure cryptographic algorithms leak significant side cha...

Please sign up or login with your details

Forgot password? Click here to reset