{"id":"https://openalex.org/W7152393907","doi":"https://doi.org/10.1109/icecet63943.2025.11472185","title":"Hardware Implementation of a Steganography System Based on FPGA","display_name":"Hardware Implementation of a Steganography System Based on FPGA","publication_year":2025,"publication_date":"2025-07-03","ids":{"openalex":"https://openalex.org/W7152393907","doi":"https://doi.org/10.1109/icecet63943.2025.11472185"},"language":null,"primary_location":{"id":"doi:10.1109/icecet63943.2025.11472185","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472185","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128996190","display_name":"Liqaa N. Sabeeh","orcid":null},"institutions":[{"id":"https://openalex.org/I2800580492","display_name":"Shatt Al-Arab University College","ror":"https://ror.org/044gzm859","country_code":"IQ","type":"education","lineage":["https://openalex.org/I2800580492"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Liqaa N. Sabeeh","raw_affiliation_strings":["Shatt Al-Arab University College,Computer Engineering Techniques Department,Basra,Iraq"],"affiliations":[{"raw_affiliation_string":"Shatt Al-Arab University College,Computer Engineering Techniques Department,Basra,Iraq","institution_ids":["https://openalex.org/I2800580492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091880250","display_name":"Mohammed A. Al-Ibadi","orcid":"https://orcid.org/0000-0002-1034-3475"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mohammed A. Al-Ibadi","raw_affiliation_strings":["University of Basrah,College of Engineering,Computer Engineering Department,Basrah,Iraq"],"affiliations":[{"raw_affiliation_string":"University of Basrah,College of Engineering,Computer Engineering Department,Basrah,Iraq","institution_ids":["https://openalex.org/I126633494"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5128996190"],"corresponding_institution_ids":["https://openalex.org/I2800580492"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87250376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.23929999768733978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.23929999768733978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.13459999859333038,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.1046999990940094,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5539000034332275},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.39879998564720154},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.36800000071525574},{"id":"https://openalex.org/keywords/reconfigurable-computing","display_name":"Reconfigurable computing","score":0.32679998874664307},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.27000001072883606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6863999962806702},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5539000034332275},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.48089998960494995},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.47269999980926514},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.39879998564720154},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.36800000071525574},{"id":"https://openalex.org/C142962650","wikidata":"https://www.wikidata.org/wiki/Q240838","display_name":"Reconfigurable computing","level":3,"score":0.32679998874664307},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.26440000534057617},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet63943.2025.11472185","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472185","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2889852389","https://openalex.org/W2998636469","https://openalex.org/W3046442238","https://openalex.org/W3082653012","https://openalex.org/W3088963840","https://openalex.org/W3091883258","https://openalex.org/W3109019281","https://openalex.org/W3130591698","https://openalex.org/W4214544218","https://openalex.org/W4293499216","https://openalex.org/W4307950802","https://openalex.org/W4313813154","https://openalex.org/W4366159545","https://openalex.org/W4387578487","https://openalex.org/W4389751739","https://openalex.org/W4396973051","https://openalex.org/W4402891822"],"related_works":[],"abstract_inverted_index":{"This":[0],"study":[1],"introduces":[2],"an":[3,136],"accelerated":[4],"image":[5],"steganography":[6,88,125],"process":[7],"employing":[8],"Four":[9],"Least":[10],"Significant":[11],"Bit":[12],"(LSB)":[13],"algorithms":[14],"through":[15],"FPGA":[16,43],"technology":[17],"to":[18,170],"conceal":[19],"and":[20,37,45,69,130,165,179,193],"retrieve":[21],"hidden":[22],"images":[23,200],"within":[24,108],"cover":[25],"images.":[26,181],"Utilizing":[27],"the":[28,49,53,76,109,120,150,173,186,199],"XSG":[29,129],"programming":[30],"technique,":[31],"two":[32],"hardware":[33],"designs":[34],"are":[35,46,157],"proposed":[36,151,174],"implemented":[38],"on":[39],"a":[40,86,99,113,117],"Xilinx":[41],"Artix":[42],"chip":[44],"compared":[47],"with":[48,65,128],"software":[50,60],"version":[51],"of":[52,112,142],"original":[54],"LSB-steganography":[55],"algorithm":[56],"(coded":[57],"in":[58,62,81],"MATLAB":[59],"running":[61],"Lenovo":[63],"PC":[64],"Core":[66],"i7":[67],"CPU":[68],"8":[70],"GB":[71],"RAM).":[72],"The":[73,123,182],"research":[74],"emphasizes":[75],"critical":[77],"need":[78],"for":[79,91,115],"speed":[80],"task":[82],"execution":[83],"nowadays,":[84],"presenting":[85],"high-speed":[87],"system":[89,175,187],"tailored":[90],"diverse":[92],"image-in-image":[93],"scenarios":[94],"such":[95],"as":[96,135],"grey-in-color":[97],"images,":[98],"Pseudo-Random":[100],"Number":[101],"Generator":[102],"(PRNG)":[103],"selects":[104],"random":[105],"bit":[106,118],"positions":[107],"RGB":[110],"values":[111],"pixel":[114],"embedding":[116],"from":[119],"secret":[121],"image.":[122],"FPGA-based":[124],"system,":[126],"developed":[127],"Vivado":[131],"design":[132],"suite,":[133],"serves":[134],"accelerator,":[137],"achieving":[138],"remarkable":[139],"processing":[140],"speeds":[141],"300":[143],"times":[144],"over":[145],"traditional":[146],"software-based":[147],"systems.":[148],"Tested":[149],"systems":[152],"using":[153],"some":[154],"measures,":[155],"which":[156],"Peak":[158],"Signal-to-Noise":[159],"Ratio":[160],"(PSNR),":[161],"Cross":[162],"Correlation":[163],"(CCR),":[164],"Mean":[166],"Squared":[167],"Error":[168],"(MSE),":[169],"ensure":[171],"that":[172,185],"produced":[176],"clear,":[177],"similar,":[178],"accurate":[180],"results":[183],"show":[184],"is":[188],"better":[189],"than":[190],"other":[191],"methods":[192],"can":[194],"hide":[195],"data":[196],"without":[197],"changing":[198],"too":[201],"much.":[202]},"counts_by_year":[],"updated_date":"2026-04-11T06:13:24.991567","created_date":"2026-04-10T00:00:00"}
