Book ChapterDOI
Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography
G. Savithri,Vinupriya,Sayali Mane,J. Saira Banu +3 more
- pp 593-605
Reads0
Chats0
TLDR
The parallelized version of chaotic steganography is proved to be an efficient algorithm for larger messages and to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.Abstract:
Information security has been one of the major concerns in the field of communication today. Steganography is one of the ways used for secure communication, where people cannot feel the existence of the secret information. The need for parallelizing an algorithm increases, as any good algorithm becomes a failure if the computation time taken by it is large. In this paper two parallel algorithms—parallel RSA (Rivest Shamir Adleman) cryptosystem with 2D-DCT (Discrete Cosine Transformation) steganography and parallel chaotic 2D-DCT steganography—have been proposed. The performance of both algorithms for larger images is determined and chaotic steganography is proved to be an efficient algorithm for larger messages. The parallelized version also proves to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.read more
Citations
More filters
Journal ArticleDOI
Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI
Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
Mukesh Dalal,Mamta Juneja +1 more
TL;DR: This article scrutinizes where the discipline of steganography and steganalysis at this point in time in context to the common user and new researchers in terms of current trends and takes stock the dataset and tools available.
Journal ArticleDOI
A Systematic Review of Computational Image Steganography Approaches
Book ChapterDOI
Hardware-Based Parallelism Scheme for Image Steganography Speed up
TL;DR: Experimental results show that for the chosen steganography algorithm, both NOC architecture and GPUs drastically decrease the execution time versus serial execution.
Proceedings ArticleDOI
Application of Hybrid Encryption Methodsin Digital Steganography Technique for Secure Communication
Sharanpreet Kaur,Surender Singh +1 more
TL;DR: In this paper , four different algorithms viz. Discrete Wavelet Transformation (DWT), Bald Eagle Search Optimization (BES), Huffman Compression and 2-dimensional logistic chaotic map have been hybridized to construct a novel algorithm.
References
More filters
Proceedings Article
A new chaos steganography algorithm for hiding multimedia data
TL;DR: The results show a good hiding for the tested data in the original images with high degree of security if steganalysis is performed on the composed original image.
Proceedings ArticleDOI
Enhancement using chaos of a steganography method in DCT domain
TL;DR: A secure DCT steganography method that allows hiding a secret image in another image randomly using Chaos is proposed and achieves higher quality and security.
Posted Content
Text Steganography using LSB insertion method along with Chaos Theory
S Bhavana,K. L. Sudha +1 more
TL;DR: This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
Journal ArticleDOI
A Single-Channel Architecture for Algebraic Integer-Based 8 $\,\times\,$ 8 2-D DCT Computation
TL;DR: An area efficient row-parallel architecture is proposed for the real-time implementation of bivariate algebraic integer (AI) encoded 2-D discrete cosine transform (DCT) for image and video processing.
Proceedings ArticleDOI
On the comparison of digital image steganography algorithm based on DCT and wavelet
TL;DR: This work compares the performance of the algorithms of steganography based on Discrete Cosine Transform (DCT) and Wavelet transform using Peak Signal-to-Noise Ration (PSNR) and finds that the DCT-based algorithm has a better PSNR when the image compression ratio increases.
Related Papers (5)
An improved RSA image encryption algorithm using 1-D logisticmap
H J Yakubu,T Aboiyar,P B Zirra +2 more