scispace - formally typeset
Book ChapterDOI

Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography

Reads0
Chats0
TLDR
The parallelized version of chaotic steganography is proved to be an efficient algorithm for larger messages and to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.
Abstract
Information security has been one of the major concerns in the field of communication today. Steganography is one of the ways used for secure communication, where people cannot feel the existence of the secret information. The need for parallelizing an algorithm increases, as any good algorithm becomes a failure if the computation time taken by it is large. In this paper two parallel algorithms—parallel RSA (Rivest Shamir Adleman) cryptosystem with 2D-DCT (Discrete Cosine Transformation) steganography and parallel chaotic 2D-DCT steganography—have been proposed. The performance of both algorithms for larger images is determined and chaotic steganography is proved to be an efficient algorithm for larger messages. The parallelized version also proves to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.

read more

Citations
More filters
Journal ArticleDOI

Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research

TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

TL;DR: This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends and takes stock the dataset and tools available.
Book ChapterDOI

Hardware-Based Parallelism Scheme for Image Steganography Speed up

TL;DR: Experimental results show that for the chosen steganography algorithm, both NOC architecture and GPUs drastically decrease the execution time versus serial execution.
Proceedings ArticleDOI

Application of Hybrid Encryption Methodsin Digital Steganography Technique for Secure Communication

TL;DR: In this paper , four different algorithms viz. Discrete Wavelet Transformation (DWT), Bald Eagle Search Optimization (BES), Huffman Compression and 2-dimensional logistic chaotic map have been hybridized to construct a novel algorithm.
References
More filters
Proceedings Article

A new chaos steganography algorithm for hiding multimedia data

TL;DR: The results show a good hiding for the tested data in the original images with high degree of security if steganalysis is performed on the composed original image.
Proceedings ArticleDOI

Enhancement using chaos of a steganography method in DCT domain

TL;DR: A secure DCT steganography method that allows hiding a secret image in another image randomly using Chaos is proposed and achieves higher quality and security.
Posted Content

Text Steganography using LSB insertion method along with Chaos Theory

S Bhavana, +1 more
- 09 May 2012 - 
TL;DR: This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
Journal ArticleDOI

A Single-Channel Architecture for Algebraic Integer-Based 8 $\,\times\,$ 8 2-D DCT Computation

TL;DR: An area efficient row-parallel architecture is proposed for the real-time implementation of bivariate algebraic integer (AI) encoded 2-D discrete cosine transform (DCT) for image and video processing.
Proceedings ArticleDOI

On the comparison of digital image steganography algorithm based on DCT and wavelet

TL;DR: This work compares the performance of the algorithms of steganography based on Discrete Cosine Transform (DCT) and Wavelet transform using Peak Signal-to-Noise Ration (PSNR) and finds that the DCT-based algorithm has a better PSNR when the image compression ratio increases.
Related Papers (5)