Abstract

Steganography is the art of concealed communication. The basic idea of steganography is to hide secret data inside a cover media in an undetectable manner. Cover media and Secret data can be any popular digital media such as image, video, audio, or text. Various types of image steganography methods have been proposed according to the cover image domain, i.e. spatial domain and transform domain. The spatial domain methods are easy and simple while the transform domain methods are more complex. However, the transform domain methods are more robust against image processing operations. Besides, they are more secure and less detectable in an unsecured channel. The recent steganography methods are based on sophisticated algorithms that include several computational time-consuming tasks, and hence they are unable to embed and extract the hidden data in real-time. Therefore, the trend is to implement the steganography methods in the hardware to speed up their processing time and so improves the efficacy of steganography techniques. FPGA is used in various fields in the modern era due to lower development cost, flexibility, and reconfigurability. Most of the published steganography techniques carried out on FPGA are based on the spatial domain. In this paper, it has comprehensively studied and reviewed various existing implementations of image steganography on FPGAs. This includes studying their general operations, requirements, and performance evaluations. This review would assist researchers in finding the research gaps in FPGA implementation of steganography methods for real-time applications.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.