Abstract
Information security has been one of the major concerns in the field of communication today. Steganography is one of the ways used for secure communication, where people cannot feel the existence of the secret information. The need for parallelizing an algorithm increases, as any good algorithm becomes a failure if the computation time taken by it is large. In this paper two parallel algorithms—parallel RSA (Rivest Shamir Adleman) cryptosystem with 2D-DCT (Discrete Cosine Transformation) steganography and parallel chaotic 2D-DCT steganography—have been proposed. The performance of both algorithms for larger images is determined and chaotic steganography is proved to be an efficient algorithm for larger messages. The parallelized version also proves to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Bhattacharyya, “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier.” Journal of global research in computer science 2, no. 4 (2011).
S. Saejung, A. Boondee, J. Preechasuk, and C. Chantrapornchai, “On the comparison of digital image steganography algorithm based on DCT and wavelet,” in Computer Science and Engineering Conference (ICSEC), 2013 International, 2013, pp. 328–333.
N. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal and L. Patnaik, “Embedding Information In DCT Coefficients Based On Average Covariance” International Journal of Engineering Science and Technology (IJEST), 3 (4), 3184–3194. 2011.
Shamim Ahmed Laskar1 and Kattamanchi Hemachandran “High Capacity data hiding using LSB Steganography and Encryption”, International Journal of Database Management Systems (IJDMS) Vol.4, No.6, December 2012
S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography using Secret Key” in Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I) 22–24 December, 201 I, Dhaka, Bangladesh
Dr. Ekta Walia, Payal Jain, Navdeep An Analysis of LSB & DCT based Steganography, Global Journal of Computer Science and Technology Vol. 10 Issue 1 (Ver 1.0), April 2010
Saravanan Chandran and Koushik Bhattacharyya, “Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography” in International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) – 2015
Samir B. Patel, Shrikant N. Pradhan and Saumitra U. Ambegaokar, “A Novel approach for implementing steganography with Computing Power Obtained by Combining CUDA and MATLAB ” in (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No.2, 2009
Amila Edirisuriya, Arjuna Madanayake, Renato J. Cintra, Vassil S. Dimitrov, and Nilanka Rajapaksha, “A Single-Channel Architecture for Algebraic Integer-Based 8 × 8 2-D DCT Computation” In Ieee Transactions On Circuits And Systems For Video Technology, Vol. 23, No. 12, December 2013
Abu Asaduzzaman, Deepthi Gummadi, and Puskar Waichal, “A Promising Parallel Algorithm to Manage the RSA Decryption Complexity” in Proceedings of the IEEE Southeast Conf 2015, April 9–12, 2015 - Fort Lauderdale, Florida
Sapna Saxena and Bhanu Kapoor, “State of the art parallel approaches for RSA public key based cryptosystem” in International Journal on Computational Sciences & Applications (IJCSA) Vol. 5, No.1, February 2015
Jatinder Kaur and Ira Gabba, “Steganography Using RSA Algorithm” in International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013
Milia Habib, Bassem Bakhache, Dalia Battikh and Safwan El Assad, “Enhancement using chaos of a Steganography method in DCT domain” in ISBN: 978-1-479-4129-2/15/$31.00©2015 IEEE
Bhavana S and Dr K L Sudha “Text Steganography Using Lsb Insertion Method Along With Chaos Theory”, site: http://arxiv.org/ftp/arxiv/papers/1205/1205.1859.pdf as on october 30th 2015.
Dr. K. L. Sudha, and Manjunath Prasad, (Aug. 2011), “Chaos image encryption using pixel shuffling with henon map,” Elixir Elec. Engg. 38, pp 4492–4495.
Anil Kumar and Rohini Sharma “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique” in International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 2013, ISSN: 2277 128X
MazharTayel, Hamed Shawky, Alaa El-Din Sayed Hafez, “A New Chaos Steganography Algorithm for Hiding Multimedia Data”, Advanced Communication Technology (ICACT), 2012, 14th International Conference on 19–22 Feb, 2012 ISSN: 1738-9445
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Savithri, G., Vinupriya, Mane, S., Saira Banu, J. (2017). Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-10-2104-6_53
Download citation
DOI: https://doi.org/10.1007/978-981-10-2104-6_53
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2103-9
Online ISBN: 978-981-10-2104-6
eBook Packages: EngineeringEngineering (R0)