Comprehensive Survey of Image Steganography Systems based on FPGA Implementation

Authors

  • Ali Y. Al-Ashwal Department of Electronics Engineering, University of Science and Technology, Sana’a, Yemen
  • Waled Hussein Al-Arashi Department of Electronics Engineering, University of Science and Technology, Sana’a, Yemen
  • Abdul-Malik H. Y. Saad College of Engineering, University of Buraimi, Al Buraimi, 512, Oman
  • Mohammed M. Al-Shadadi Department of Electronics Engineering, University of Science and Technology, Sana’a, Yemen

DOI:

https://doi.org/10.59222/ustjet.2.1.3

Keywords:

steganography, information hiding, FPGA, hardware implementation, LSB, DWT

Abstract

Steganography is the art of concealed communication. The basic idea of steganography is to hide secret data inside a cover media in an undetectable manner. Cover media and Secret data can be any popular digital media such as image, video, audio, or text. Various types of image steganography methods have been proposed according to the cover image domain, i.e. spatial domain and transform domain. The spatial domain methods are easy and simple while the transform domain methods are more complex. However, the transform domain methods are more robust against image processing operations. Besides, they are more secure and less detectable in an unsecured channel. The recent steganography methods are based on sophisticated algorithms that include several computational time-consuming tasks, and hence they are unable to embed and extract the hidden data in real-time. Therefore, the trend is to implement the steganography methods in the hardware to speed up their processing time and so improves the efficacy of steganography techniques. FPGA is used in various fields in the modern era due to lower development cost, flexibility, and reconfigurability. Most of the published steganography techniques carried out on FPGA are based on the spatial domain. In this paper, it has comprehensively studied and reviewed various existing implementations of image steganography on FPGAs. This includes studying their general operations, requirements, and performance evaluations. This review would assist researchers in finding the research gaps in FPGA implementation of steganography methods for real-time applications.

Downloads

Published

2024-11-04

Issue

Section

Articles