With the rapid growth of world wide networks, internet and computers, the security and protection of personal information against illegal accesses are the main challenges. Encryption and information hiding are two main approaches for providing information security in many research areas and applications. Cryptography could provide a high level of security in communicatio but the main weaknesses of it is that enemies can detect the fact of communication secrecy. For this reason, some methods with a higher security level than encryption are needed. Unlike encryption methods, in information hiding methods with regards to embedding sensitive information (secret message) in a bigger volume of digital data (cover media) it could not easily detectable by enemies. Because of destructive nature of information hiding methods in their embedding processes, they have some artifacts on cover media. In digital media, information hiding could changes statistical features and leads to enemy suspicion. The best information hiding methods have least effects on cover media while increasing embedding data. Embedding efficiency refers to these two indices (maximum embedding rate and least effect). With regard to embedding efficiency index, Bn and Tn are two of the best information hiding methods in binary and Non-binary spaces. But these two methods have some weaknesses. Main weakness is that two methods use big tables for embedding steps and for large values of n (segment size), they have exponentially growth. For this reason it is impossible to using these methods for large n. To address this problem a general method has been proposed for Bn method; but by this time there is no idea for generalization of Tn method according to its high computation complexity. In this thesis a general method is proposed for Tn information hiding algorithm and two selected methods, are implemented by hardware. At the first, another solution for extension of Bn method is proposed by using state diagram. After that, a solution for extension of Tn is proposed by using state diagram. Then, to simplify the software and hardware implementation and to reduce the usage of hardware resources on FPGA, Bn Msg and Tn Msg methods are proposed by a small changs in Bn and Tn structures. C Sharp and Verilog programming languages are used for software and hardware implementation, respectively. Keywords: Tn method, Bn method, extension of Tn steganographic method,