Space Filling Curve for Data Filling: An Embedded Security Approach