{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:58:22Z","timestamp":1755795502835},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018,11,1]]},"DOI":"10.1587\/transinf.2018edp7174","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T22:47:18Z","timestamp":1541026038000},"page":"2754-2761","source":"Crossref","is-referenced-by-count":5,"title":["Lightweight Security Hardware Architecture Using DWT and AES Algorithms"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Ignacio","family":"ALGREDO-BADILLO","sequence":"first","affiliation":[{"name":"Computer Science Department, CONACYT-National Institute of Astrophysics, Optics and Electronics"}]},{"given":"Francisco R.","family":"CASTILLO-SORIA","sequence":"additional","affiliation":[{"name":"Telecommunication Engineering Department, Autonomous University of San Luis Potos\u00ed"}]},{"given":"Kelsey A.","family":"RAM\u00cdREZ-GUTI\u00c9RREZ","sequence":"additional","affiliation":[{"name":"Computer Science Department, CONACYT-National Institute of Astrophysics, Optics and Electronics"}]},{"given":"Luis","family":"MORALES-ROSALES","sequence":"additional","affiliation":[{"name":"Civil Engineering Faculty, CONACYT-Michoacan University of Saint Nicholas of Hidalgo"}]},{"given":"Alejandro","family":"MEDINA-SANTIAGO","sequence":"additional","affiliation":[{"name":"Computer Science Department, CONACYT-National Institute of Astrophysics, Optics and Electronics"}]},{"given":"Claudia","family":"FEREGRINO-URIBE","sequence":"additional","affiliation":[{"name":"Computer Science Department, CONACYT-National Institute of Astrophysics, Optics and Electronics"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] T. Fujino, T. Kubota, and M. Shiozaki, \u201cTamper-resistant cryptographic hardware,\u201d IEICE Electronics Express, vol.14, no.2, 20162004, 2017, DOI: 10.1587\/elex.14.20162004. 10.1587\/elex.14.20162004","DOI":"10.1587\/elex.14.20162004"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] K.F. Rafat and M.J. Hussain, \u201cSecure steganography for digital images,\u201d International Journal of Advanced Computer Science and Applications, vol.7, no.6, pp.45-59, 2016. 10.14569\/ijacsa.2016.070606","DOI":"10.14569\/IJACSA.2016.070606"},{"key":"3","unstructured":"[3] S. Baddap, K. Khomane, P. Deshmukh, and P. Shilpa, \u201cHardware implementation of LSB steganography for data security,\u201d International Journal of Innovative Research in Advanced Engineering, vol.2, no.3, pp.59-63, 2015."},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] M. Nagata, D. Fujimoto, N. Miura, N. Homma, Y.-I. Hayashi, and K. Sakiyama, \u201cProtecting cryptographic integrated circuits with side-channel information,\u201d IEICE Electronics Express, vol.14, no.2, 20162005, 2017, DOI: 10.1587\/elex.14.20162005. 10.1587\/elex.14.20162005","DOI":"10.1587\/elex.14.20162005"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] V. B\u00e1noci, G. Bug\u00e1r, and D. Levick\u00fd, \u201cA novel method of image steganography in DWT domain,\u201d Proc. 21st International Conference Radioelektronika, 2011, DOI: 10.1109\/RADIOELEK.2011.5936455. 10.1109\/radioelek.2011.5936455","DOI":"10.1109\/RADIOELEK.2011.5936455"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] NIST, \u201cFIPS PUB 197: Advanced Encryption Standard (AES),\u201d National Institute of Standards and Technology, 2001. 10.6028\/nist.fips.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"7","unstructured":"[7] R. Oshana, ed., DSP for Embedded and Real-Time Systems, Newnes, Elsevier, Walham, 2012. 10.1016\/C2010-0-67143-4"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] A.B. Lopez, K. Vatanparvar, A.P.D. Nath, S. Yang, S. Bhunia, and M.A.A. Faruque, \u201cA security perspective on battery systems of the Internet of Things,\u201d Journal of Hardware and Systems Security, vol.1, no.2, pp.188-199, 2017, DOI: 10.1007\/s41635-017-0007-0. 10.1007\/s41635-017-0007-0","DOI":"10.1007\/s41635-017-0007-0"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] H.-T. Wu, Y.-T. Wu, and W.-W. Chang, \u201cBiometric identification using JPEG200 compressed ECG signal,\u201d IEICE Trans. Inf. &amp; Syst., vol.E98-D, no.10, pp.1829-1837, Oct. 2015. 10.1587\/transinf.2015edp7035","DOI":"10.1587\/transinf.2015EDP7035"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] N. Hirata, T. Nozaki, and M. Kawamura, \u201cImage watermarking method satisfying IHC by using PEG LDPC code,\u201d IEICE Trans. Inf. &amp; Syst., vol.E100-D, no.1, pp.13-23, Jan. 2017. 10.1587\/transinf.2016mup0003","DOI":"10.1587\/transinf.2016MUP0003"},{"key":"11","unstructured":"[11] M.U. Umamaheswari, S. Sivasubramanian, and S. Pandiarajan, \u201cAnalysis of different steganographic algorithms for secured data hiding,\u201d IJCSNS International Journal of Computer Science and Network Security, vol.10, no.8, pp.154-160 (2010)."},{"key":"12","unstructured":"[12] M. Weeks, Digital Signal Processing Using MATLAB and Wavelets, Infinity Science Press LLC, 2007, ISBN: 0-9778582-0-0."},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] X. Liao, H. Zhang, and M. Koshimura, \u201cReconstructing AES key schedule images with SAT and MaxSAT,\u201d IEICE Trans. Inf. &amp; Syst., vol.E99-D, no.1, pp.141-150, Jan. 2016. 10.1587\/transinf.2015edp7223","DOI":"10.1587\/transinf.2015EDP7223"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] I. Algredo-Badillo, C. Feregrino-Uribe, and R. Cumplido, \u201cDesign and implementation of an FPGA-based 1.452 Gbps non-pipelined AES architecture,\u201d Computational Science and Its Applications, ICCSA 2006, Lecture Notes in Computer Science, vol.3982, pp.456-465, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. 10.1007\/11751595_49","DOI":"10.1007\/11751595_49"},{"key":"15","unstructured":"[15] B.A. Forouzan, Cryptography and Network Security, McGraw-Hill Education, 2007."},{"key":"16","unstructured":"[16] A.A. Jadhav, R.V. Babar, and M.S. Gaikwad, \u201cHardware implementation of digital watermarking system for video authentication using bit replacement algorithm &amp; DWT,\u201d International Journal on Emerging Trends in Technology, vol.1, no.1, pp.111-114 (2014)."},{"key":"17","unstructured":"[17] C.S. Maya and G. Sabarinath, \u201cAn optimized FPGA implementation of LSB replacement steganography using DWT,\u201d International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol.2, Special Issue 1, pp.586-593, 2013."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] A.F. Mahmood, N.A. Kanai, and S.S. Mohmmad, \u201cAn FPGA implementation of secured steganography communication system,\u201d Tikrit Journal of Engineering Sciences, vol.19, no.4, pp.14-23, 2012.","DOI":"10.25130\/tjes.19.4.02"},{"key":"19","unstructured":"[19] K.N. Pansare and A.K. Kureshi, \u201cA review \u2014 FPGA implementation of different steganographic technique,\u201d International Journal of Innovative Research in Science, Engineering and Technology, vol.3, Special Issue 4, pp.377-381, 2014."},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] B.J. Mohd, T. Hayajneh, and A.N. Quttoum, \u201cWavelet-transform steganography: Algorithm and hardware implementation,\u201d International Journal of Electronic Security and Digital Forensics, vol.5, no.3\/4, pp.241-256, 2013, DOI: 10.1504\/IJESDF.2013.058657. 10.1504\/ijesdf.2013.058657","DOI":"10.1504\/IJESDF.2013.058657"},{"key":"21","unstructured":"[21] L.V. Bogdanov et al., \u201cApproaches for reducing the power consumption in embedded systems,\u201d Annual Journal of Electronics, 2012."},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] N. Lu, N. Cheng, N. Zhang, X. Shen, and J.W. Mark, \u201cConnected vehicles: Solutions and challenges,\u201d IEEE Internet of Things Journal, vol.1, no.4, pp.289-299, 2014. 10.1109\/jiot.2014.2327587","DOI":"10.1109\/JIOT.2014.2327587"},{"key":"23","unstructured":"[23] E. Schmidt, \u201cVehicle connectivity in intelligent transport systems: Today and future,\u201d International Automotive Engineering Conference, 2017."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/11\/E101.D_2018EDP7174\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:34:59Z","timestamp":1662338099000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/11\/E101.D_2018EDP7174\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,1]]},"references-count":23,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018edp7174","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,1]]}}}