Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the information but also contains the ways to save it, protect it and preserve it. The meaning of the proverb however stresses up...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of applied sciences (Asian Network for Scientific Information) 2012, Vol.12 (3), p.201-210
Hauptverfasser: Rajagopalan, S, Amirtharajan, R, Upadhyay, H N, Rayappan, JBB
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 210
container_issue 3
container_start_page 201
container_title Journal of applied sciences (Asian Network for Scientific Information)
container_volume 12
creator Rajagopalan, S
Amirtharajan, R
Upadhyay, H N
Rayappan, JBB
description Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the information but also contains the ways to save it, protect it and preserve it. The meaning of the proverb however stresses upon how to protect and secure information, as a small leakage will pave way for entire loss of information which should be protected. True, there have been various methods, approaches and algorithms proposed in the past and will emerge in future too in the areas of secure information transmission. Cryptography and steganography have been primary sources for information security. The bird's eye view on the literature pertaining to the above mentioned two giants of information security spots a number of algorithms developed on both software as well as hardware platforms. This study does the survey from the literature on different cryptographic and image steganographic methods implemented on a reconfigurable hardware like FPGAs in the past. The analysis of various methods proposed earlier is also an important objective of this study.
doi_str_mv 10.3923/jas.2012.201.210
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1762126378</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1020855531</sourcerecordid><originalsourceid>FETCH-LOGICAL-c224t-57af7faad937639f83ad0e5abe777a54538af442c59a51efe4b8d415276138043</originalsourceid><addsrcrecordid>eNqFkE1Lw0AQhvegYK3ePeboJXU_s5tjKfYDChai52WazNaUNIm7qZJ_b2LFq5d3YHjeYXgIeWB0JlIuno4QZpwyPsaMM3pFJswwHqtEyRtyG8KRUimSVE_ILjv7T-wjqItoXkPVhzJEjYvW4Isv8BgtfN92zcFD-17mP1jW4QHqv1XWhw5PQ6mOlrvV_I5cO6gC3v_OKXlbPr8u1vH2ZbVZzLdxzrnsYqXBaQdQpEInInVGQEFRwR611qCkEgaclDxXKSiGDuXeFJIprhMmzPD9lDxe7ra--Thj6OypDDlWFdTYnINlOuGMJ0Kb_1HKqVFKCTag9ILmvgnBo7OtL0_g-wGyo1s7uLWj2zHs4FZ8A8hFbjc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1020855531</pqid></control><display><type>article</type><title>Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Science Alert</source><creator>Rajagopalan, S ; Amirtharajan, R ; Upadhyay, H N ; Rayappan, JBB</creator><creatorcontrib>Rajagopalan, S ; Amirtharajan, R ; Upadhyay, H N ; Rayappan, JBB</creatorcontrib><description>Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the information but also contains the ways to save it, protect it and preserve it. The meaning of the proverb however stresses upon how to protect and secure information, as a small leakage will pave way for entire loss of information which should be protected. True, there have been various methods, approaches and algorithms proposed in the past and will emerge in future too in the areas of secure information transmission. Cryptography and steganography have been primary sources for information security. The bird's eye view on the literature pertaining to the above mentioned two giants of information security spots a number of algorithms developed on both software as well as hardware platforms. This study does the survey from the literature on different cryptographic and image steganographic methods implemented on a reconfigurable hardware like FPGAs in the past. The analysis of various methods proposed earlier is also an important objective of this study.</description><identifier>ISSN: 1812-5654</identifier><identifier>DOI: 10.3923/jas.2012.201.210</identifier><language>eng</language><subject>Algorithms ; Computer information security ; Computer programs ; Cryptography ; Hardware ; Platforms ; Preserves</subject><ispartof>Journal of applied sciences (Asian Network for Scientific Information), 2012, Vol.12 (3), p.201-210</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c224t-57af7faad937639f83ad0e5abe777a54538af442c59a51efe4b8d415276138043</citedby><cites>FETCH-LOGICAL-c224t-57af7faad937639f83ad0e5abe777a54538af442c59a51efe4b8d415276138043</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,4110,27902,27903,27904</link.rule.ids></links><search><creatorcontrib>Rajagopalan, S</creatorcontrib><creatorcontrib>Amirtharajan, R</creatorcontrib><creatorcontrib>Upadhyay, H N</creatorcontrib><creatorcontrib>Rayappan, JBB</creatorcontrib><title>Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA</title><title>Journal of applied sciences (Asian Network for Scientific Information)</title><description>Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the information but also contains the ways to save it, protect it and preserve it. The meaning of the proverb however stresses upon how to protect and secure information, as a small leakage will pave way for entire loss of information which should be protected. True, there have been various methods, approaches and algorithms proposed in the past and will emerge in future too in the areas of secure information transmission. Cryptography and steganography have been primary sources for information security. The bird's eye view on the literature pertaining to the above mentioned two giants of information security spots a number of algorithms developed on both software as well as hardware platforms. This study does the survey from the literature on different cryptographic and image steganographic methods implemented on a reconfigurable hardware like FPGAs in the past. The analysis of various methods proposed earlier is also an important objective of this study.</description><subject>Algorithms</subject><subject>Computer information security</subject><subject>Computer programs</subject><subject>Cryptography</subject><subject>Hardware</subject><subject>Platforms</subject><subject>Preserves</subject><issn>1812-5654</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNqFkE1Lw0AQhvegYK3ePeboJXU_s5tjKfYDChai52WazNaUNIm7qZJ_b2LFq5d3YHjeYXgIeWB0JlIuno4QZpwyPsaMM3pFJswwHqtEyRtyG8KRUimSVE_ILjv7T-wjqItoXkPVhzJEjYvW4Isv8BgtfN92zcFD-17mP1jW4QHqv1XWhw5PQ6mOlrvV_I5cO6gC3v_OKXlbPr8u1vH2ZbVZzLdxzrnsYqXBaQdQpEInInVGQEFRwR611qCkEgaclDxXKSiGDuXeFJIprhMmzPD9lDxe7ra--Thj6OypDDlWFdTYnINlOuGMJ0Kb_1HKqVFKCTag9ILmvgnBo7OtL0_g-wGyo1s7uLWj2zHs4FZ8A8hFbjc</recordid><startdate>2012</startdate><enddate>2012</enddate><creator>Rajagopalan, S</creator><creator>Amirtharajan, R</creator><creator>Upadhyay, H N</creator><creator>Rayappan, JBB</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7UA</scope><scope>C1K</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>7TB</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>FR3</scope><scope>JG9</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2012</creationdate><title>Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA</title><author>Rajagopalan, S ; Amirtharajan, R ; Upadhyay, H N ; Rayappan, JBB</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c224t-57af7faad937639f83ad0e5abe777a54538af442c59a51efe4b8d415276138043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Computer information security</topic><topic>Computer programs</topic><topic>Cryptography</topic><topic>Hardware</topic><topic>Platforms</topic><topic>Preserves</topic><toplevel>online_resources</toplevel><creatorcontrib>Rajagopalan, S</creatorcontrib><creatorcontrib>Amirtharajan, R</creatorcontrib><creatorcontrib>Upadhyay, H N</creatorcontrib><creatorcontrib>Rayappan, JBB</creatorcontrib><collection>CrossRef</collection><collection>Water Resources Abstracts</collection><collection>Environmental Sciences and Pollution Management</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of applied sciences (Asian Network for Scientific Information)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rajagopalan, S</au><au>Amirtharajan, R</au><au>Upadhyay, H N</au><au>Rayappan, JBB</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA</atitle><jtitle>Journal of applied sciences (Asian Network for Scientific Information)</jtitle><date>2012</date><risdate>2012</risdate><volume>12</volume><issue>3</issue><spage>201</spage><epage>210</epage><pages>201-210</pages><issn>1812-5654</issn><abstract>Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the information but also contains the ways to save it, protect it and preserve it. The meaning of the proverb however stresses upon how to protect and secure information, as a small leakage will pave way for entire loss of information which should be protected. True, there have been various methods, approaches and algorithms proposed in the past and will emerge in future too in the areas of secure information transmission. Cryptography and steganography have been primary sources for information security. The bird's eye view on the literature pertaining to the above mentioned two giants of information security spots a number of algorithms developed on both software as well as hardware platforms. This study does the survey from the literature on different cryptographic and image steganographic methods implemented on a reconfigurable hardware like FPGAs in the past. The analysis of various methods proposed earlier is also an important objective of this study.</abstract><doi>10.3923/jas.2012.201.210</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1812-5654
ispartof Journal of applied sciences (Asian Network for Scientific Information), 2012, Vol.12 (3), p.201-210
issn 1812-5654
language eng
recordid cdi_proquest_miscellaneous_1762126378
source EZB-FREE-00999 freely available EZB journals; Science Alert
subjects Algorithms
Computer information security
Computer programs
Cryptography
Hardware
Platforms
Preserves
title Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T13%3A43%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survey%20and%20Analysis%20of%20Hardware%20Cryptographic%20and%20Steganographic%20Systems%20on%20FPGA&rft.jtitle=Journal%20of%20applied%20sciences%20(Asian%20Network%20for%20Scientific%20Information)&rft.au=Rajagopalan,%20S&rft.date=2012&rft.volume=12&rft.issue=3&rft.spage=201&rft.epage=210&rft.pages=201-210&rft.issn=1812-5654&rft_id=info:doi/10.3923/jas.2012.201.210&rft_dat=%3Cproquest_cross%3E1020855531%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1020855531&rft_id=info:pmid/&rfr_iscdi=true