VLSI Design - 2018 - Desai - Crypto Stego Real Time CSRT System For Secure Reversible Data Hiding
VLSI Design - 2018 - Desai - Crypto Stego Real Time CSRT System For Secure Reversible Data Hiding
VLSI Design
Volume 2018, Article ID 4804729, 8 pages
https://doi.org/10.1155/2018/4804729
Research Article
Crypto-Stego-Real-Time (CSRT) System for
Secure Reversible Data Hiding
Received 17 May 2018; Revised 16 August 2018; Accepted 1 September 2018; Published 27 September 2018
Copyright © 2018 Latika Desai and Suresh Mali. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Due to demand of information transfer through higher speed wireless communication network, it is time to think about security
of important information to be transferred. Further, as these communication networks are part of open channel, to preserve
the security of any Critical Information (CI) is really a challenging task in any real-time application. Data hiding techniques
give more security and robustness of important CI against encryption or cryptographic software solutions. However, hardwired
approach exhibits better solution not only in terms of reduction of complexity but also in terms of adaptive real-time output. This
paper demonstrates frequency, Discrete Cosine Transform (DCT) domain Steganographic data hiding hardware solution for secret
communication called Crypto-Stego-Real-Time (CSRT) System. The challenge is to design a secure algorithm keeping reliability of
minimum distortion of original cover signal while embedding considerable amount of CI. Field Programmable Gate Array (FPGA)
implementation shown in this paper is more secure, robust, and fast. Pipelining process while embedding enhances the speed of
embedding, optimizes the memory utilization, and gives better Peak Signal to Noise Ratio (PSNR) and high robustness. Practically
implemented hardware Steganographic solutions shown in this paper also give better performance than that of the current state-
of-the-art hardware implementations.
rather than in the data directly. This approach gives improved Analysis of the state-of-the-art techniques leads to some
efficiency and also allows us to do public key Steganography. interesting findings: frequency domain gives high robustness
The Steganography approach introduced by Odeh et al. [18] and high imperceptibility. However, these techniques are very
is a real-time hardware engine, where text is embedded. By complex and time consuming while being implemented in
taking care of a real-time application proposed work is hardware. Further, data hiding Capacity, Security, and Ro-
faster to maintain security in communication over Internet. bustness parameters are mutually exclusive to each other and
However, because of lack of parallel processing, the speed of therefore optimizing them in real-time hardware environ-
embedding is low. If we consider different applications like ment is really a tough task. The support of parallel processing
covert communication, fingerprinting, and copyright protec- helps in compensating for the time needed for such complex
tion as well as many more, the most important parameters computations.
observed are the security, robustness, invisibility, time com-
plexity, and area and power dissipation. Among all these 3. Proposed Methodology
parameters security is the major aspect and is commonly used
in all these different applications announced by Fedrich [19]. Any non-Critical Information called cover data (C) acts as a
The FPGA-based microarchitecture defined by Farouk et carrier of Critical Information (CI). A Secrete Key (K) is used
al. [20] with the secret key feature is suitable for real-time by the Steganographic embedding function (fEm ) to hide CI
application. Selecting the hiding bits in a pseudorandom and gives Stego data (S) as an output (device at Transmitting
manner as a function of a secret key has been used to increase end DT ) as shown in
obscurity. The receiver needs only the modulated cover and
the secret key to recover the message, i.e., no original cover is 𝐷𝑇
𝑆 → 𝑓𝐸𝑚 (𝐶, 𝐶𝐼, 𝐾) (1)
required.
The importance of DCT in terms of scalability and mini- where S is Stego data, C is cover data, CI is Critical Informa-
mal distortion demonstrated by Cariccia et al. [21] as well as tion, and K is Secrete Key.
Renda et al. [22] is quite noticeable. Because of the ability The same Secrete Key (K) is used by the Steganographic
of DCT algorithms to produce high throughput, low power extraction function (fEx ) to extract CI (as a device at
dissipation, and reduced chip area with primary objective of receiving end DR ) as shown in
security, they are more popular amongst the researchers.
𝐷𝑅
Cryptographic different approaches are demonstrated 𝐶𝐼 → 𝑓𝐸𝑥 (𝑆, 𝐾) (2)
through [23–29] using Virtex 5 FPGA platform. While secur-
ing the data, with AES (Advanced Encryption Standard) as where S is Stego data, CI is Extracted Critical Information,
well as Data Decryption Systems Standard (DES) and Triple and K is Secrete Key.
DES (TDES) using FPGA, different approaches are imple- Typical generalized hardware Steganographic data hiding
mented to enhance the performance for secure communica- mechanism is as shown in Figure 1.
tion. However, the area utilization is varying from 260 LEs Proposed hardware based reversible data hiding system to
to 9276 LEs. Watermarking method using DWT [30] with implement data hiding system consists of both cryptographic
344.329 MHz frequency has also shown considerably less and Steganographic approach and therefore is called Crypto-
area utilized with more delays in the process of embedding. Stego-Real-Time (CSRT) System. Figure 2 outlines the pro-
Comparison of software and hardware implementation of posed methodology.
such systems is given in Table 1. This table shows that the As a part of cryptography, the encryption process is
hardware deployment gives more speed, the secrecy, and converting CI from plain text into unintelligible ciphertext.
the robustness with minimum cost as compared to software On the receiving side of the process, decryption is used to
counterpart. Brief analysis of various techniques [31–37] to convert this unintelligible ciphertext back into plaintext CI
develop such systems is given in Table 2. The frequency as an extracted CI. If CI consists of M “Characters” in CI,
domain techniques demonstrated in [32–37] as well as [21, stored in the Message Cache, it can be represented as
22] show better performance in terms of imperceptibility,
capacity, robustness, and process. 𝐶𝐼 = [𝑋0 , 𝑋1 , 𝑋2 , . . . , 𝑋𝑀−1 , ] (3)
3979, 2018, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2018/4804729, Wiley Online Library on [20/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
4 VLSI Design
Stego Data
(S)
Cover Data (C) Extracted
fEm
E fE
Ex Critical
Critical
Information (CI’)
Information (CI)
Unintentional
Attacks(A) or
Intentional
Device at Trapping Device at
Transmitting end (DT ) By Hacker (H) Receiving end (DR )
Embedding Extraction
Steganography
Steganography
(f Em) (f Ex)
C
S
CI Encryption Decryption CI’
where M is number of characters in CI stored in “Message The format of content of Li while selecting the character
Cache” at ‘A0 to AM−1 address locations in a sequence. and specific bit of the character is as shown in Figure 3. As
The process of encryption typically carried out using there are 8 bits in each character, the randomization is also
“Randomly Selected Set of Addresses” stored in a “LOOK- applicable to these bits.
UP Table” is randomly selecting any address location (Am ) The proposed algorithm works on 8 bytes of cover at a
of Message Cache and hence, at any given time, one of the time as follows:
characters stored in Message Cache get selected as “Ym ”
and can be written as follows: there is a “LOOK-UP Table” 𝐶 = [𝐵7 , 𝐵6 , 𝐵5 , . . . , 𝐵0 ] (6)
consisting of random numbers which eventually act as an
addresses to locate any random character at “Message Cache”. where B7 to B0 = 8 bytes of the cover given to CSRT at any
Obviously, the number of locations in “LOOK-UP Table” is 8 given time whose DCT can be written as
times more than that of the number of locations in “Message
Cache”, i.e., 8∗M. At any given time, one of the characters 𝐷 = 𝐷𝐶𝑇 (𝐶) (7)
stored in “Message Cache” gets selected as “Randomly Selected
where D is A set of 8 DCT coefficients of 8 respective bytes of
Character” given by
the cover given in (6) which can also be written as
𝑌𝑚 = [𝐴 𝑚 ] = [[𝐿 𝑖 ]] = [[𝐶𝑛𝑡]] (4)
𝐷 = 𝐶7 , 𝐶6 , 𝐶5 , . . . , 𝐶0 (8)
where Ym is Randomly Selected Character and Am is Ran-
domly Selected Address for “Message Cache” and eventually where every DCT coefficient (C) consists of signed binary
content of sequential location of “LOOK-UP Table” 0 to M-1 representation. The bit selected (shown in Figure 3) is embed-
excluding three “Least Significant Bits” of content of Li . ded in C3 . Embedding of the bit in C3 is nothing but making
The “Clock Generator” of CSRT selects sequential loca- LSB of C3 as that of bit to be embedded as
tions of “LOOK-UP Table” and is given as
𝐿 𝑖 = 𝐶𝑛𝑡 (5) LSB of 𝐶3 = Selected Bit of 𝑌𝑚
(9)
where Cnt is output of the COUNTER. = Selected Bit of [[𝐿 𝑖 ]]
3979, 2018, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2018/4804729, Wiley Online Library on [20/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
VLSI Design 5
Selected BIT
Random ‘BIT’Selection’ for Embedding
CLOCK MUX
LOOK-UP
Table Message
‘8 M’ Cache
COUNTER
Locations ‘M’
Ym
Bytes
Address
For
LOOK-UP
After modifying the LSB of C3 inverse DCT (IDCT) of D is (CI ) the Stego data (S) sent from the PC to FPGA board on
taken to get Stego as follows: byte by byte basis and the extracted CI’ stored in FPGA RAM
at Message Cache is validated by receiving it on PC.
𝑆 = 𝐼𝐷𝐶𝑇 (𝐷) (10)
where is S is the Stego block of data consisting of 8 bytes 6. Result and Discussion
having an embedded bit of information in LSB of C3 .
This section declares the analysis of different parameters like
PSNR, area, and the time. The different methodologies are
4. Embedding Algorithm explained in the literature such as LSB, MSB, DWT, IWT,
and proposed approach [CSRT]. The PSNR values are shown
(1) Accept CI into Message Cache
through Figure 5. The proposed hardware approach gives
(2) Accept LOOK-UP Table as an Embedding Key (K) 73.77 dB PSNR value which is approximately 10% more than
(3) Accept 8-byte cover data (C) mentioned approaches.
The analysis of the proposed hardware approach for
(4) Compute DCT of 8 bytes of cover data
the area in terms of Slice Registers, Slice Look-Up-Tables
(5) Randomly select byte (Ym ) from Message Cache (LUTs), and slice LUT-FF pair used in various approaches is
(6) Select a bit using 3 LSBs of contents of selected byte demonstrated through Figures 6, 7, and 8 respectively. The
LOOK-UP Table proposed CSRT method uses only 241 Slice Registers and 1202
LUTs.
(7) Embed the selected bit at DCT coefficient C3
To understand the performance, speed of execution of
(8) Compute IDCT of 8 bytes of cover data to get Stego algorithm of embedding of CI has been considered. This time
data varies from 84.48 𝜇s to 1351.68 𝜇s while embedding of CI
(9) Repeat Step-3 to Step-8 for all the bits of all the from 128 bytes to 2 K bytes in 1K bytes to 16 K bytes of cover
characters Message Cache data; Figure 9 gives an idea of reduction of processing speed
of the proposed CSRT method.
(10) Stop.
Security of the system is very high as the cryptographic
Although there are multiple steps in the proposed algorithm, Encryption and Steganographic data hiding processes has
it is possible to have parallel processing of Step-(3) to Step-8. been developed in FPGA hardware. Although hidden data
If we take Pre Em = Step-(3) and Step-(4), Emd = Step-(5) and are reversible and can be recovered by the intended user, it
Step-(6) and Post-Em = Step-(7) and Step-(8), it is possible to should not be detectable by any hacker (most of the hackers
reduce the total time required for embedding all the bits of are nonsuspicious) as shown in Figure 2. The sharing of a
Message Cache as shown in Figure 4. common key is important for the intended extractor. This
key may be predecided from look up table which eventually
5. Experimental Set Up randomly select the bits of the characters from message cache
for embedding. A person who knows the algorithm and look-
The logic necessary to implement the algorithm is down- up table must be the person who will be able to extract the
loaded from the PC to Configurable FPGA board using Critical Information (CI). For example, for 128 bytes of CI,
Virtex-5, XC5VLX50T, FFG1136C Board. Critical Informa- there will be 1 K bytes of look-up table and the attacker has to
tion (CI) and Embedding Key (K) are transferred to the FPGA try 21024 and check permutations and combinations of look-
RAM at Message Cache and LOOK-UP Table, respectively. The up table provided that the embedder knows the algorithm. As
cover data (C) is then transferred on byte by byte basis. After CI increases, the size of the look-up table also increases, and
the embedding process, it gets validated by transferring Stego hence the permutations and combinations of look-up table.
data (S) back to PC. While extracting the Critical Information Although this dependability is the drawback of the system,
3979, 2018, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2018/4804729, Wiley Online Library on [20/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
6 VLSI Design
T
Pre_Em Emd Post_Em
Pre_Em Emd Post_Em
Pre_Em Emd Post_Em
Pre_Em Emd Post_Em
PSNR
80 73.77
70 63.18
60.9
60
51.2
50 43.6
PSNR
40
30
20
10
0
1 [10] LSB[8]
DWT 2 3
MSB[12] 4
IWT[9] 5
DCT[CSRT]
2000
1500
1206 1105
1000 808
500 399
255 241
0
1
[23] 2
[24] 3
[25] 4
[26] 5
[28] 6 [CSRT]
[29] 7
9000
8000
7000
6000
5000 4721
4000 3788 3557
3000
2000 1338 1692
1202
1000
0
1
[23] 2
[24] 3
[25] 4
[26] 5
[28] 6 [CSRT]
[29] 7
1600
1400
Processing Time (s)
1351.68
1200
1000
800
675.84
600
400 337.92
200 168.96
84.48
0
1
128 2
256 3
512 4
1024 5
2048
Critical Information (Message Bits)
the system is reconfigurable and, therefore, one can design Conflicts of Interest
the look-up table of any size based on size of the CI.
The authors declare that they have no conflicts of interest.
7. Conclusion
Acknowledgments
The Crypto-Stego-Real-Time (CSRT) System presented in
We are thankful to Dr. D. Y. Patil Institute of Technology,
this paper is highly secured due to its implementation in
Pimpri, Pune, for encouragement and support.
hardware. As the encryption of CI has been done in the hard-
ware using cache memory, the random addresses of cache
memory are used for scribbling CI to be embedded in the References
cover bit by bit fashion. One cannot extract CI unless he/she
knows the algorithm and look-up table as a key of embedding. [1] S. Debnath, M. Kalita, and S. Majumder, “A Review on Hard-
ware Implementation of Steganography,” in Proceedings of the
Pipelining process while embedding enhances the speed
Devices for Integrated Circuit, pp. 149–152, Kalyani, India, March
of embedding and optimizes the memory utilization. The 2017.
system PSNR (73.77), Number of Slice LUTs used (1202), [2] M. Faheem, S. Jamel, A. Hassan, Z. A., N. Shafinaz, and M. Mat,
and execution time (1351.68 𝜇S for 2 K bits of CI) show an “A Survey on the cryptographic encryption algorithms,” Inter-
evidence of better performance in terms of throughput of national Journal of Advanced Computer Science and Applica-
the system. The drawback of the system is its Embedding tions, vol. 8, no. 11, pp. 333–344, 2017.
Key which varies with CI. As CI increases, the size of the [3] https://www.infosecurity-magazine.com/magazine-features/
key also increases. However, the system is reconfigurable tales-crypt-hardware-software/.
and, therefore, one can design the look-up table of any size [4] S. P. Maity and M. K. Kundu, “Distortion free image-in-image
based on the size of the CI. The overall performance of the communication with implementation in FPGA,” Elsevier Inter-
presented CSRT system is better than current state-of-the-art national Journal of Electronics and Communications, vol. 67, pp.
methods and, therefore, it is most suitable for any real-time 438–447, 2012.
applications. [5] R. Balakrishnan, A. Rengarajan, and J. B. B. Rayappan, “Multi-
plexed stego path on reconfigurable hardware: a novel random
approach,” Elsevier Computers and Electrical Engineering, vol.
Data Availability 55, pp. 153–163, 2016.
[6] S. N. Mali, P. M. Patil, and R. M. Jalnekar, “Robust and secured
The data used to support the findings of this study are avail- image-adaptive data hiding,” Digital Signal Processing, vol. 22,
able from the corresponding author upon request. no. 2, pp. 314–323, 2012.
3979, 2018, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2018/4804729, Wiley Online Library on [20/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
8 VLSI Design
[7] E. Gómez-Hernández, C. Feregrino-Uribe, and R. Cumplido, [23] M. H. Rais and S. M. Qasim, “Virtex-5 Fpga implementation of
“FPGA hardware architecture of the steganographic context advanced encryptionstandard algorithm,” in Proceedings of the
technique,” in Proceedings of the IEEE Computer Society Inter- 3rd Global Conference on Power Control and Optimization, pp.
national Conference on Electronics, Communications and Com- 201–206, May 2010.
puters, pp. 123–128, Mexico, March 2008. [24] P. Ghosal, M. Biswas, and M. Biswas, “Hardware Implementa-
[8] B. J. Mohd, T. Hayajneh, S. Abed, and A. Itradat, “Analysis and tion of TDES CryptoSystem with on chip verification in FPGA,”
modeling of FPGA implementations of spatial steganography Journal of Telecommunications, vol. 1, no. 1, pp. 113–117, 2010.
methods,” Journal of Circuits, Systems and Computers, vol. 23, [25] K. Rahimunnisa, P. Karthigaikumar, S. Rasheed, J. Jayakumar,
no. 2, pp. 1–25, 2014. and S. Sureshkumar, “FPGA implementation of AES algorithm
[9] B. Ramalingam, R. Amirtharajan, and J. B. B. Rayappan, “Stego for high throughput using folded parallel architecture,” Security
on FPGA: An IWT Approach,” Hindawi Publishing Corporation and Communication Networks, vol. 7, no. 11, pp. 2225–2236,
Scientific World Journal, pp. 1–9, 2014. 2014.
[10] B. J. Mohd, T. Hayajneh, and A. N. Quttoum, “Wavelet-trans- [26] U. Farooq and M. F. Aslam, “Comparative analysis of different
form steganography: Algorithm and hardware implementa- AES implementation techniques for efficient resource usage and
tion,” International Journal of Electronic Security and Digital better performance of an FPGA,” Journal of King Saud Uni-
Forensics, vol. 5, no. 3-4, pp. 241–256, 2013. versity - Computer and Information Sciences, vol. 29, no. 3, pp.
[11] S. Mahmoudpour and S. Mirzakuchaki, “Hardware Architec- 295–302, 2017.
ture for a Message Hiding Algorithm with Novel Randomizers,” [27] A. Gielata, P. Russek, and K. Wiatr, “AES Hardware Implemen-
International Journal of Computer Applications, vol. 37, no. 7, pp. tation in FPGA for Algorithm Acceleration Purpose,” in Pro-
46–53, 2012. ceedings of the ICSES 2008 International Conference on Signals
[12] S. Rajagopala, P. J. Prabhakar, M. S. Kumar et al., “MSB Based and Electronic Systems, ICSES’08, pp. 137–140, Poland, Septem-
Embedding with Integrity: An Adaptive RGB Stego on FPGA ber 2008.
Platform,” Information Technology Journal, vol. 13, no. 12, pp. [28] S. Sadoudi, C. Tanougast, M. S. Azzaz, and A. Dandache,
1945–1952, 2014. “Design and FPGA Implementation of a wireless hyperchaotic
[13] A. Mahmood, N. Kanai, and S. Mohmmad, “An FPGA imple- communication system for secure real-time image transmis-
mentation of secured steganography communication system,” sion,” Journal on Image and Video Processing Springer, pp. 1–18,
Tikrit Journal of Engineering Sciences, vol. 19, no. 4, pp. 14–23, 2013.
2012. [29] R. R. Farashahi, B. Rashidi, and S. M. Sayedi, “FPGA based fast
[14] R. Sundararaman and H. Narayan Upadhyay, “Stego system on and high-throughput 2-slow retiming 128-bit AES encryption
chip with lfsr based information hiding approach,” International algorithm,” Microelectronics Journal, vol. 45, pp. 1014–1025, 2014.
Journal of Computer Applications, vol. 18, no. 2, pp. 24–31, 2011. [30] P. P. Karthigai and A. K. Baskaran, “FPGA implementation of
[15] A. Shabir, A. Parah Javaid, and G. M. Bhat, “Data hiding in high speed low area DWT based invisible image watermarking
intermediate significant bit planes, a high capacity blind ste- algorithm,” in Proceedings of the International Conference on
ganographic technique,” in Proceedings of the IEEE International Communication Technology and System Design Elsevier, vol. 30,
Conference on Emerging Trends in Science, Engineering and pp. 266–273, October 2012.
Technology, pp. 192–197, 2012. [31] T.-T. Quach, “Optimal cover estimation methods and stegano-
[16] S. A. El Rahman, “A comparative analysis of image steganog- graphic payload location,” IEEE Transactions on Information
raphy based on DCT algorithm and steganography tool to hide Forensics and Security, vol. 6, no. 4, pp. 1214–1222, 2011.
nuclear reactors confidential information,” Computers and Elec- [32] H.-L. Yeh, S.-T. Gue, P. Tsai, and W.-K. Shih, “Wavelet bit-plane
trical Engineering, pp. 1–20, 2016. based data hiding for compressed images,” AEÜ - International
[17] R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganog- Journal of Electronics and Communications, vol. 67, no. 9, pp.
raphy,” IEEE Journal on Selected Areas in Communications, vol. 808–815, 2013.
16, no. 4, pp. 474–481, 1998. [33] A. Valizadeh and Z. J. Wang, “Correlation-and-bit-aware spread
[18] A. Odeh, K. Elleithy, and M. Faezipour, “Fast real-time hard- spectrum embedding for data hiding,” IEEE Transactions on
ware engine for multipoint text steganography,” in Proceedings Information Forensics and Security, vol. 6, no. 2, pp. 267–282,
of the 2014 IEEE Long Island Systems, Applications and Technol- 2011.
ogy Conference, LISAT 2014, pp. 1–5, May 2014. [34] Q. Mao, “A fast algorithm for matrix embedding steganography,”
[19] J. Fridrich, Steganography in Digital Media: Principles, Algo- Digital Signal Processing, vol. 25, no. 1, pp. 248–254, 2014.
rithms, and Applications, Cambridge University Press, New [35] O. M. Al-Qershi and B. E. Khoo, “High capacity data hiding
York, NY, USA, 2009. schemes for medical images based on difference expansion,” The
[20] H. A. Farouk and M. Saeb, “Design and implementation of a sec- Journal of Systems and Software, vol. 84, no. 1, pp. 105–112, 2011.
ret key steganographic micro-architecture employing FPGA,” in [36] A. Khamrui and J. K. Mandal, “A Genetic Algorithm-Based
Proceedings of the ASP - DAC 2004 Asia and South Pacific Design Steganography using Discrete Cosine Transformation (GAS-
Automation Conference - 2004, pp. 577-578, Japan, January DCT),” in Proceedings of the International Conference on Com-
2004. putational Intelligence: Modeling Techniques and Applications,
[21] F. Cariccia, P. Cariccia, M. Martina, A. Molino, and F. Vacca, vol. 10, pp. 105–111, 2013.
“Multimedia SoC: A systolic core for embedded DCT evalu- [37] N. A. Saleh, H. N. Boghdady, S. I. Shaheen, and A. M. Darwish,
ation,” in Proceedings of the IEEE Conference Paper, pp. 1749– “High capacity lossless data embedding technique for palette
1753, USA, November 2002. images based on histogram analysis,” Digital Signal Processing,
[22] G. Renda, M. Masera, M. Martina, and G. Masera, “Approxi- vol. 20, no. 6, pp. 1629–1636, 2010.
mate Arai DCT architecture for HEVC,” in Proceedings of the
1st New Generation of CAS, NGCAS 2017, pp. 133–136, Italy,
September 2017.