Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security

Author(s): Vardhana M.* and Anil Kumar Bhat

Volume 10, Issue 4, 2020

Page: [634 - 638] Pages: 5

DOI: 10.2174/2210327909666190319150314

Price: $65

Abstract

Background: Security is one of the fundamental and essential factors, which has to be addressed in the field of communication. Communication refers to the exchange of useful information between two or more nodes. Sometimes it is required to exchange some of the confidential information such as a company’s logo, which needs to be hidden from the third person. The data that is being exchanged between these nodes has to be kept confidential and secured from unintended users. The three fundamental components of security are confidentiality, integrity and authentication. The data that is being exchanged has to be confidential, and only the authorized party should have access to the information that is being exchanged. One of the key methods for securing the data is encryption.

Objective: The main objective of this paper was to address the problem of data hiding and security in communication systems. There is a need for having hardware resources for having high speed data security and protection.

Methods: In this paper, we implemented image watermarking using LSB technique to hide a secret image, and employed encryption using Advanced Encryption Standard, to enhance the security of the image. An image is a two dimensional signal, with each pixel value representing the intensity level. The secure transmission of the image along the channel is a challenging task, because of the reason that, any individual can access it, if no security measures are taken.

Results: In this paper, hardware realization of image watermarking/encryption and dewatermarking/ decryption is implemented using Very Large Scale Integration. The design is verified by means of co-simulation using MATLAB and Xilinx. The paper also presents the performance parameters of the design, with respect to speed, area and power.

Conclusion: An efficient method of digital watermarking has been implemented with increased security and performance parameters are presented.

Keywords: AES, cryptography, encryption, RTL, VLSI, watermarking.

« Previous
Graphical Abstract
[1]
Noor DS. Encryption and Decryption Digital Image Using Confusion System European Academic Research 2014; 1(11)
[2]
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 1998; 8(6): 1259-84.
[http://dx.doi.org/10.1142/S021812749800098X]
[3]
Yu S. Cong W, Kui R, Wenjing L. Achieving secure, scalable, and fine-grained data access control in cloud computing. 2010 Proceedings IEEE INFOCOM. San Diego, CA, USA, 2010.
[4]
Mahesh M, Srinivasan D, Kankanala M, Amutha R. Image cryptography using discrete haar wavelet transform and arnold cat map. 2015 International Conference on Communications and Signal Processing (ICCSP) Melmaruvathur, India. 2015.2015.
[5]
Abualigah LMQ. 2019.Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering Studies in Computational Intelligence Abualigah LMQ and Hanandeh ES 2015.
[http://dx.doi.org/10.1007/978-3-030-10674-4]
[6]
Abualigah LMQ, Hanandeh ES. Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 2017; 5(1): 19.
[7]
Abualigah LM, Khader AT. Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 2017; 73(11): 4773-95.
[http://dx.doi.org/10.1007/s11227-017-2046-2]
[8]
Abualigah LM, Khader AT, Hanandeh ES. Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 2018; 48: 4047-71.
[9]
A Combination of Objective Functions and Hybrid Krill Herd Algorithm for Text Document Clustering Analysis. Eng Appl Artif Intell 2018; 73: 111-25.
[10]
A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 2018; 25: 456-6.
[http://dx.doi.org/10.1016/j.jocs.2017.07.018]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy