IMPLEMENTATION OF IMAGE STEGANOGRAPHY ON 32-BIT RISC PROCESSOR
Modern digitization has resulted in versatility to eradicate the divergence among the types of information travel flanked by the users. It presents a pliable approach for the erratic block size selection in an impulsive mode to spice up the extent of sophistication within the stego algorithm. The plan of this work includes the elimination of key exchange for encoding and improving the safety to a large level without compromising the image quality and embedding capacity. The embedded hardware for stego implementations uses a picture carrier that creates soaring demand on memory, the extremely inhibited resource of embedded devices. The efficiency of the algorithm is to take care of image quality. Different applications are there for various requirements
Veer, E. & Yadav, E. (2026). Implementation of Image Steganography on 32-Bit RISC Processor. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.377
Veer, Er.Praveen, and Er.Vinod Yadav. "Implementation of Image Steganography on 32-Bit RISC Processor." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.377.
Veer, Er.Praveen, and Er.Vinod Yadav. "Implementation of Image Steganography on 32-Bit RISC Processor." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.377.
[2] Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J.
Inform. Technol., 5: 53-66
[3] Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognition., 37: 469-474
[4] Cheddad, Abbas, et al.” Digital image steganography: Survey and analysis of current methods.” Signal processing 90.3 (2010): 727-752.
[5] Mohd, Bassam J. Thaier Hayajneh, and Ahmad Nahar Quttoum.” Wavelet-transform steganography: Algorithm and hardware implementation.” International Journal of Electronic Security and Digital Forensics 5.3-4 (2013): 241-256.
[6] Zhenghao Shi and Lifeng He,” Application of Neural Networks in Medical Image Processing” Second International Symposium on Networking and Network Security (ISNNS 10).
[7] M.Vrhel E. Saber, and H.J. Trussell, “Color image generation and display technologies,” IEEE Signal Processing Mag., vol. 22, no. 1, pp. 23–33, Jan. 2005.
[8] K.N. Plataniotis and A.N. Venetsanopoulos, Color Image Processing and Applications. Heidelberg: Springer, 2000.
[9] Huang T. S., Schreiber, W. F., Tretiak, O. J. (1971). Image processing. Proceedings of the IEEE, 59(11), 1586–1609.
[10] J.M. Abrham, C. E. Catchpole, and G. W. Goodrich, “Image processing with a multiaperture, image dissector,” SPIE J., vol. 6, 1968, pp. 93-96.