{"title":"基于FPGA的鲁棒水印系统实现","authors":"H. A. E. Zouka","doi":"10.1109/ITNG.2008.235","DOIUrl":null,"url":null,"abstract":"The study of communication security includes not just encryption but also traffic security, whose essence lies in hiding information. In the paper we are going to introduce a new approach that enables us to conceal the very existence of the message: The host digital media file will be unchanged, but a key which is based on a seed number will be communicated and generates a sequence of numbers that identifies bits in the host digital media file that contains the secret message. Therefore, no statistical artifacts that would aid anyone trying to crack the code are introduced. However, the limitation of capacity has led us to think about an improved approach which can be achieved through hardware implementation systems on a help of a programmable gate array (FPGA) board.","PeriodicalId":89615,"journal":{"name":"Proceedings of the ... International Conference on Information Technology: New Generations. International Conference on Information Technology: New Generations","volume":"32 1","pages":"1274-1278"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"FPGA Based Implementation of Robust Watermarking System\",\"authors\":\"H. A. E. Zouka\",\"doi\":\"10.1109/ITNG.2008.235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The study of communication security includes not just encryption but also traffic security, whose essence lies in hiding information. In the paper we are going to introduce a new approach that enables us to conceal the very existence of the message: The host digital media file will be unchanged, but a key which is based on a seed number will be communicated and generates a sequence of numbers that identifies bits in the host digital media file that contains the secret message. Therefore, no statistical artifacts that would aid anyone trying to crack the code are introduced. However, the limitation of capacity has led us to think about an improved approach which can be achieved through hardware implementation systems on a help of a programmable gate array (FPGA) board.\",\"PeriodicalId\":89615,\"journal\":{\"name\":\"Proceedings of the ... International Conference on Information Technology: New Generations. International Conference on Information Technology: New Generations\",\"volume\":\"32 1\",\"pages\":\"1274-1278\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... International Conference on Information Technology: New Generations. International Conference on Information Technology: New Generations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNG.2008.235\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... International Conference on Information Technology: New Generations. International Conference on Information Technology: New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2008.235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
FPGA Based Implementation of Robust Watermarking System
The study of communication security includes not just encryption but also traffic security, whose essence lies in hiding information. In the paper we are going to introduce a new approach that enables us to conceal the very existence of the message: The host digital media file will be unchanged, but a key which is based on a seed number will be communicated and generates a sequence of numbers that identifies bits in the host digital media file that contains the secret message. Therefore, no statistical artifacts that would aid anyone trying to crack the code are introduced. However, the limitation of capacity has led us to think about an improved approach which can be achieved through hardware implementation systems on a help of a programmable gate array (FPGA) board.