scispace - formally typeset
Proceedings ArticleDOI

Parallel Chaos Hash based LSB Steganography Technique using Logistic Map

Reads0
Chats0
TLDR
In this article , hash based secure chaotic steganography technique for hiding secret information, into the cover image was proposed and shared memory implementation for faster execution of the proposed security technique has been done in OpenMP platform.
Abstract
This paper deals with hash based secure chaotic steganography technique for hiding secret information, into the cover image. Hash function has been used in the proposed work for computing the Non LSB positions for hiding the secret data bits. Secret is encoded with chaotic sequences and randomness of the sequences has been validated with NIST test suite. Shared memory implementation for faster execution of the proposed security technique has been done in OpenMP platform. Sequential and the parallel versions of the techniques have been implemented in C++, OpenMP and simulated in the Intel Haswell processor based multi-core environment. With the advantages offered by multicore processors the proposed technique ensures low time complexity. Significant speedup and linear scalability have been reported with increase in the number of threads. Standard statistical validation test results viz. PSNR, Euclidean distance, histogram analysis, SSIM index applied to validate the quality of stego image show satisfactory results.

read more

Content maybe subject to copyright    Report

References
More filters
Book

Cryptography and Network Security

TL;DR: This book includes the following chapters: Introduction to Modern Symmetric-Key Ciphers, Mathematics of Cryptography, and Message Integrity and Message Authentication, and Security at the Network Layer: IPSec.

High Performance Computing

emontmej
TL;DR: The key elements of the Core Program will be described including the construction of a UK e-Science Grid and the need to develop a data architecture for the Grid that will allow federated access to relational databases as well as flat files.
Journal Article

A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier

TL;DR: This paper provides a critical review of steganography as well as to analyze the characteristics of various cover media namely image, text, audio and video in respects of the fundamental concepts, the progress of Steganographic methods and the development of the corresponding steganalysis schemes.
Journal ArticleDOI

A novel keyed parallel hashing scheme based on a new chaotic system

TL;DR: A new chaotic system is proposed and employed to design a secure and fast hash function, which has a dynamic random array of functions and can be implemented by a parallel architecture and proves security of the proposed function.
Journal ArticleDOI

A structure-based chaotic hashing scheme

TL;DR: Empirical results verify the high sensitivity of the proposed hash function to the input message and the secret key and compared with existing schemes, especially those based on chaotic maps, the proposed scheme is shown to have superior performance.