Skip to main content

Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography

  • Conference paper
  • First Online:
Proceedings of International Conference on Computer Vision and Image Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 459))

Abstract

Information security has been one of the major concerns in the field of communication today. Steganography is one of the ways used for secure communication, where people cannot feel the existence of the secret information. The need for parallelizing an algorithm increases, as any good algorithm becomes a failure if the computation time taken by it is large. In this paper two parallel algorithms—parallel RSA (Rivest Shamir Adleman) cryptosystem with 2D-DCT (Discrete Cosine Transformation) steganography and parallel chaotic 2D-DCT steganography—have been proposed. The performance of both algorithms for larger images is determined and chaotic steganography is proved to be an efficient algorithm for larger messages. The parallelized version also proves to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Bhattacharyya, “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier.” Journal of global research in computer science 2, no. 4 (2011).

    Google Scholar 

  2. S. Saejung, A. Boondee, J. Preechasuk, and C. Chantrapornchai, “On the comparison of digital image steganography algorithm based on DCT and wavelet,” in Computer Science and Engineering Conference (ICSEC), 2013 International, 2013, pp. 328–333.

    Google Scholar 

  3. N. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal and L. Patnaik, “Embedding Information In DCT Coefficients Based On Average Covariance” International Journal of Engineering Science and Technology (IJEST), 3 (4), 3184–3194. 2011.

    Google Scholar 

  4. Shamim Ahmed Laskar1 and Kattamanchi Hemachandran “High Capacity data hiding using LSB Steganography and Encryption”, International Journal of Database Management Systems (IJDMS) Vol.4, No.6, December 2012

    Google Scholar 

  5. S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography using Secret Key” in Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I) 22–24 December, 201 I, Dhaka, Bangladesh

    Google Scholar 

  6. Dr. Ekta Walia, Payal Jain, Navdeep An Analysis of LSB & DCT based Steganography, Global Journal of Computer Science and Technology Vol. 10 Issue 1 (Ver 1.0), April 2010

    Google Scholar 

  7. Saravanan Chandran and Koushik Bhattacharyya, “Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography” in International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) – 2015

    Google Scholar 

  8. Samir B. Patel, Shrikant N. Pradhan and Saumitra U. Ambegaokar, “A Novel approach for implementing steganography with Computing Power Obtained by Combining CUDA and MATLAB ” in (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No.2, 2009

    Google Scholar 

  9. Amila Edirisuriya, Arjuna Madanayake, Renato J. Cintra, Vassil S. Dimitrov, and Nilanka Rajapaksha, “A Single-Channel Architecture for Algebraic Integer-Based 8 × 8 2-D DCT Computation” In Ieee Transactions On Circuits And Systems For Video Technology, Vol. 23, No. 12, December 2013

    Google Scholar 

  10. Abu Asaduzzaman, Deepthi Gummadi, and Puskar Waichal, “A Promising Parallel Algorithm to Manage the RSA Decryption Complexity” in Proceedings of the IEEE Southeast Conf 2015, April 9–12, 2015 - Fort Lauderdale, Florida

    Google Scholar 

  11. Sapna Saxena and Bhanu Kapoor, “State of the art parallel approaches for RSA public key based cryptosystem” in International Journal on Computational Sciences & Applications (IJCSA) Vol. 5, No.1, February 2015

    Google Scholar 

  12. Jatinder Kaur and Ira Gabba, “Steganography Using RSA Algorithm” in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013

    Google Scholar 

  13. Milia Habib, Bassem Bakhache, Dalia Battikh and Safwan El Assad, “Enhancement using chaos of a Steganography method in DCT domain” in ISBN: 978-1-479-4129-2/15/$31.00©2015 IEEE

    Google Scholar 

  14. Bhavana S and Dr K L Sudha “Text Steganography Using Lsb Insertion Method Along With Chaos Theory”, site: http://arxiv.org/ftp/arxiv/papers/1205/1205.1859.pdf as on october 30th 2015.

  15. Dr. K. L. Sudha, and Manjunath Prasad, (Aug. 2011), “Chaos image encryption using pixel shuffling with henon map,” Elixir Elec. Engg. 38, pp 4492–4495.

    Google Scholar 

  16. Anil Kumar and Rohini Sharma “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique” in International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 2013, ISSN: 2277 128X

    Google Scholar 

  17. MazharTayel, Hamed Shawky, Alaa El-Din Sayed Hafez, “A New Chaos Steganography Algorithm for Hiding Multimedia Data”, Advanced Communication Technology (ICACT), 2012, 14th International Conference on 19–22 Feb, 2012 ISSN: 1738-9445

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Savithri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Savithri, G., Vinupriya, Mane, S., Saira Banu, J. (2017). Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-10-2104-6_53

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2104-6_53

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2103-9

  • Online ISBN: 978-981-10-2104-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics