A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography

A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography

Gaurav Gambhir, Monika Gambhir, Jyotsna Kumar Mandal
Copyright: © 2022 |Volume: 10 |Issue: 1 |Pages: 14
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781683182832|DOI: 10.4018/IJSI.303581
Cite Article Cite Article

MLA

Gambhir, Gaurav, et al. "A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography." IJSI vol.10, no.1 2022: pp.1-14. http://doi.org/10.4018/IJSI.303581

APA

Gambhir, G., Gambhir, M., & Mandal, J. K. (2022). A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography. International Journal of Software Innovation (IJSI), 10(1), 1-14. http://doi.org/10.4018/IJSI.303581

Chicago

Gambhir, Gaurav, Monika Gambhir, and Jyotsna Kumar Mandal. "A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography," International Journal of Software Innovation (IJSI) 10, no.1: 1-14. http://doi.org/10.4018/IJSI.303581

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The paper presents a novel, 3D Chaotic Dynamics assisted secured and imperceptible, LSB steganography technique for hiding secret information, into the RGB color components of a cover image. Random numbers generated with three dimensional chaotic function assist in embedding and extracting the secret data in the payload, enhancing the transmission security. The quality of the pseudorandom number sequences has been tested with the standard NIST test suite as a pre-embedding operation. The proposed steganography technique is highly secure, robust and fast in execution as it utilizes multicore processors available today with most of the desktop and laptop computers. Statistical analysis of the technique validates the security and robustness while scalability and speed-up analysis validate the efficiency of the proposed parallel steganography technique. Significant performance has been observed even when a large amount of data is processed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.