Scientific and Technical Journal

ELECTROTECHNIC AND COMPUTER SYSTEMS

ISSN Print 2221-3937
ISSN Online 2221-3805
STEGANOGRAPHY DATA HIDING IN LUT-ORIENTED HARDWARE CONTAINERS METHOD DEVELOPMENT
Abstract:
There is method development proposed for implementing the method of steganography data hiding in hardware containers carrying LUT-oriented architecture. The method based data embedding into LUT-container is the procedure including current processing LUT-unit value invert conversion and invert distribution for all the LUT-units inputs connected to the current unit outputs. The principals of invert distribution for LUT-unit single inputs have been described.  The statement is powered that the group invert distribution is possible for several LUT-unit inputs. We can estimate approaches to hardware and software implementation of the method offered.
Authors:
Keywords
DOI
10.15276/etks.13.89.2014.33
References

1. Konahovich G.F., and Puzirenko A.U. Kompyuternaya steganografiya [Computer Steganography], (2006), Kiev, Ukraine, МК-Press Publ., 288 p. (In Russian).

  1.  Gribunyn V.G. Tsifrovaya steganografiya [Digital Steganography], (2002), Moscow, Russian Federation, Salon-Press Publ., 344p. (In Russian).
  2.  Agranovsky A.V., Balkin A.V., and Gribunyn V.G. Steganografiya, tsifrovye vodyanye znaki i stegoanaliz [Steganography, Digital Watermarks and Stegoanalysis], (2009), Moscow, Russian Federation: University Book Publ., 220p. (In Russian).

4. Skoudis E., and Zeltser L. Malware: Fighting Malicious Code, (2004), New Jersey: Prentice Hall Publ., 672 p. (In English).

5. El-Khalil R., and Keromytis A. Hydan: Hiding Information in Program Binaries, (2004), Proceedings of International Conference on Informaton and Communications Security (ICICS-2004), Malaga, Spain, pp. 187 – 199, (In English), doi: 10.1007/978-3-540-30191-2_15.

6. Hamilton A., and Danicic S. A Survey of Static Software Watermarking, (2011),Proceedings of Internet Security World Congress (WorldCIS-2011), London, 2011, pp. 100 – 107. (In English).

7. Hakun L., and Keiichi K. New approaches for software watermarking by register allocation, (2008), Proceedings of the ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel Distributed Computing, pp. 63 – 68, (In English), doi: 10.1109/SNPD.2008.137.

8. Xiao Cheng L., and Zhiming C. Software Watermarking Algorithm Based on Register Allocation, (2010), Proceedings ofInternational Symposium Distributed Computing and Applications to Business Engineering and Science (DCABES), Hong Kong, 2010, pp. 539 – 543, (In English), doi: 10.1109/DCABES.2010.114.

9. Zashcholkin K.V., and Inanova E.N. Metod steganograficheskogo skrytiya dannykh v LUT-orientirovannykh apparatnykh konteinerakh [Method of Stegano Graphical Hiding of Information in LUT-oriented Hardware Containers], (2013), Electrotechnic and Computer Systems, Kiev, Ukraine, No. 12 (88), pp. 83 – 90 (In Russian).

10. Maxfield C. Proektirovanie na PLIS: arkhitektura, sredstva, metody [Design on FPGA: Architecture, Tools, Methods], (2007), Moscow, Russian Federation: Dodeka-XXI Publ., 408p. (In Russian).

Published:
Last download:
2017-11-17 05:12:31

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]
Яндекс.Метрика