scispace - formally typeset
Search or ask a question
Book ChapterDOI

Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography

01 Jan 2017-pp 593-605
TL;DR: The parallelized version of chaotic steganography is proved to be an efficient algorithm for larger messages and to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.
Abstract: Information security has been one of the major concerns in the field of communication today. Steganography is one of the ways used for secure communication, where people cannot feel the existence of the secret information. The need for parallelizing an algorithm increases, as any good algorithm becomes a failure if the computation time taken by it is large. In this paper two parallel algorithms—parallel RSA (Rivest Shamir Adleman) cryptosystem with 2D-DCT (Discrete Cosine Transformation) steganography and parallel chaotic 2D-DCT steganography—have been proposed. The performance of both algorithms for larger images is determined and chaotic steganography is proved to be an efficient algorithm for larger messages. The parallelized version also proves to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.
Citations
More filters
Journal ArticleDOI
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.

253 citations

Journal ArticleDOI
TL;DR: This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends and takes stock the dataset and tools available.
Abstract: Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends. Also, what has been accomplished in order to critically examine what has been done well and what ought to be done better. The state-of-the-art techniques for steganography and steganalysis (image and video) have been deliberated for the last 5 years literature. Further, the paper also takes stock the dataset and tools available for multimedia steganography and steganalysis with the examples where steganography has been used in real-life. It is a corpus of the author’s opinion and the viewpoints of different other researchers and practitioners, working in this discipline. Additionally, experiments were done using image steganography techniques to analyse the recent trends. This survey is intended to provide a complete guide for common people and new researchers and scholars approaching this field, sight on the existing and the future of steganography and steganalysis.

44 citations

Book ChapterDOI
01 Jan 2021
TL;DR: Experimental results show that for the chosen steganography algorithm, both NOC architecture and GPUs drastically decrease the execution time versus serial execution.
Abstract: Steganography is the art of concealing a document in another one. The main goal of steganography is hiding the existence of a message in a communication. Some steganography techniques are based on logical operations and calculations. The used algorithm for parallelism is an image steganography algorithm adapted from LSB substitution method in which secret image is embedded in a cover image. Since parallelism is the most used approach for speeding up the processes, in the proposed method, parallelization is used and is done in data level. In this paper different parallelism based implementations of a steganography method are presented. The parallelism schemes that are investigated in this research are (1) Parallelism using Graphical Processing Unit (GPU) and (2) parallelism using Network On a Chip (NOC). Experimental results show that for the chosen steganography algorithm, both NOC architecture and GPUs drastically decrease the execution time versus serial execution.

3 citations

Proceedings ArticleDOI
01 Dec 2022
TL;DR: In this paper , four different algorithms viz. Discrete Wavelet Transformation (DWT), Bald Eagle Search Optimization (BES), Huffman Compression and 2-dimensional logistic chaotic map have been hybridized to construct a novel algorithm.
Abstract: In this research article, the four main challenges of steganography viz. payload capacity, imperceptibility, robustness and security have been addressed. Four different algorithms viz. Discrete Wavelet Transformation (DWT), Bald Eagle Search Optimization (BES), Huffman Compression and 2-dimensional logistic chaotic map have been hybridized to construct a novel algorithm. The proposed methodology is validated by calculating the values of PSNR, MSE, SSIM, and BPP and compared with the results achieved by different researchers. Further Gaussian noise and crop attacks have been considered to investigate the effect on the secret image. Our methodology is able to thwart the Gaussian Noise attack but could not recover from the cropping attack with optimum quality. This can become an interesting topic for further research in the future. The proposed method has been compared to others, and it performs better overall. For future work, the pixels of the secret image that has been losing can be regenerated by applying any suitable technique.
References
More filters
Proceedings ArticleDOI
01 Dec 2011
TL;DR: A best approach for Least Significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the security level of hidden information and the Peak Signal-to-Noise Ratio (PSNR) to measure the quality of the stego images.
Abstract: This paper introduces a best approach for Least Significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the security level of hidden information. It is a new approach to substitute LSB of RGB true color image. The new security conception hides secret information within the LSB of image where a secret key encrypts the hidden information to protect it from unauthorized users. In general, in LSB methods, hidden information is stored into a specific position of LSB of image. For this reason, knowing the retrieval methods, anyone can extract the hidden information. In our paper, hidden information is stored into different position of LSB of image depending on the secret key. As a result, it is difficult to extract the hidden information knowing the retrieval methods. We have used the Peak Signal-to-Noise Ratio (PSNR) to measure the quality of the stego images. The value of PSNR gives better result because our proposed method changes very small number of bits of the image. The obtained results show that the proposed method results in LSB based image steganography using secret key which provides good security issue and PSNR value than general LSB based image steganography methods.

207 citations

Journal Article
TL;DR: Analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) basedSteganography is presented, an implementation of both methods and their performance analysis has been done.
Abstract: This paper presents analysis of Least Significant Bit (LSB) based Steganography and Discrete Cosine Transform (DCT) based Steganography. LSB based Steganography embed the text message in least significant bits of digital picture. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover file. Unfortunately, it is vulnerable to even a small image manipulation. Converting an image from a format like GIF or BMP, which reconstructs the original message exactly (lossless compression) to a JPEG, which does not (lossy compression), and then back could destroy the information hidden in the LSBs. DCT based Steganography embed the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.

131 citations

Journal Article
TL;DR: This paper provides a critical review of steganography as well as to analyze the characteristics of various cover media namely image, text, audio and video in respects of the fundamental concepts, the progress of Steganographic methods and the development of the corresponding steganalysis schemes.
Abstract: The staggering growth in communication technology and usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channels have greater vulnerability to security threats causing unauthorized information access. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, text, video or audio, etc, and then transmitted secretly to the receiver. Steganalysis is another important topic in information hiding which is the art of detecting the presence of steganography. This paper provides a critical review of steganography as well as to analyze the characteristics of various cover media namely image, text, audio and video in respects of the fundamental concepts, the progress of steganographic methods and the development of the corresponding steganalysis schemes

80 citations

Journal ArticleDOI
TL;DR: The main objective in this paper is to provide resistance against visual and statistical attacks as well as high capacity data embedding approach by the combination of Steganography and cryptography.
Abstract: The network provides a method of communication to distribute information to the masses. With the growth of data communication over computer network, the security of information has become a major issue. Steganography and cryptography are two different data hiding techniques. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. We propose a high capacity data embedding approach by the combination of Steganography and cryptography. In the process a message is first encrypted using transposition cipher method and then the encrypted message is embedded inside an image using LSB insertion method. The combination of these two methods will enhance the security of the data embedded. This combinational methodology will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. A comparative analysis is made to demonstrate the effectiveness of the proposed method by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). We analyzed the data hiding technique using the image performance parameters like Entropy, Mean and Standard Deviation. The stego images are tested by transmitting them and the embedded data are successfully extracted by the receiver. The main objective in this paper is to provide resistance against visual and statistical attacks as well as high capacity.

77 citations

Proceedings ArticleDOI
10 Sep 2015
TL;DR: An overview of steganography, its applications, and difference from cryptography is given and performance of the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet transform (DWT) is analyzed.
Abstract: Digital watermarking have been used for maintaining copyright information of the digital media for a decade. Digital watermarking is a technique used for embedding copyright information in the media files. The media file could be an image, an audio, a video, or a text. Steganography have been used in the Digital watermarking application. Steganography has become more important due to the exponential growth of communication of potential computer information on the internet. Steganography differs from cryptography, such that cryptography hides the contents of secret message, whereas, steganography is about hiding the message in media effectively. This research article gives an overview of steganography, its applications, and difference from cryptography. This research article analyses performance of the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT).

25 citations