Research Article

Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding

Table 1

Hardware versus software based implementation of data security.

Software ImplementationHardware Implementation

Generalized design under PC environmentCustomized designed using FPGAs (ES)

Complex Algorithms can be possibleSimplified Algorithms with hardware

Not a Real time solutionReal time solution with hardware

More power requires for PCLess power required for embedded system

Easy to modify the designDifficult to modify the design

More area & cannot execute without PC.Less area & can execute without PC.

Not PortablePortable

The Cost of PC, OS and language supportLow-cost due to specific hardware involved

Less securedMore secured

Easy to copy the implemented code.Difficult to copy the implemented hardware.

All operations are sequentialParallel operations are possible