Research Article
Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding
Table 1
Hardware versus software based implementation of data security.
| Software Implementation | Hardware Implementation |
| Generalized design under PC environment | Customized designed using FPGAs (ES) |
| Complex Algorithms can be possible | Simplified Algorithms with hardware |
| Not a Real time solution | Real time solution with hardware |
| More power requires for PC | Less power required for embedded system |
| Easy to modify the design | Difficult to modify the design |
| More area & cannot execute without PC. | Less area & can execute without PC. |
| Not Portable | Portable |
| The Cost of PC, OS and language support | Low-cost due to specific hardware involved |
| Less secured | More secured |
| Easy to copy the implemented code. | Difficult to copy the implemented hardware. |
| All operations are sequential | Parallel operations are possible |
|
|