Skip to main content
Erschienen in: Microsystem Technologies 11/2021

12.02.2020 | Technical Paper

Multicore implementation and performance analysis of a chaos based LSB steganography technique

verfasst von: Gaurav Gambhir, Jyotsna Kumar Mandal

Erschienen in: Microsystem Technologies | Ausgabe 11/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Temporal complexity of data security algorithms for information exchange on internet is becoming a daunting challenge. Performance enhancement of these algorithms using multi core CPUs has now become the standard approach. An OpenMP implementation of chaos based least significant bit steganography technique is proposed in the paper to address this issue. The paper reports (i) standard statistical validation test results viz. histogram analysis, SSIM index, euclidean distance, PSNR for the test sample, (ii) results of the statistical testing on generated chaotic bit sequences, using the NIST suites and (iii) scalability analysis of the multi core implementation of the technique. Significant speed up and linear scalability have been reported with increase in the number of cores from 1 to 16 for Intel Haswell®Processor.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abu Taha M (2017) Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures. Electronics, unpublished Ph.D. thesis, Universite de Nantes Abu Taha M (2017) Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures. Electronics, unpublished Ph.D. thesis, Universite de Nantes
Zurück zum Zitat Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos based cryptosystems. Int J Bifurc Chaos 16:2129–2151MathSciNetCrossRef Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos based cryptosystems. Int J Bifurc Chaos 16:2129–2151MathSciNetCrossRef
Zurück zum Zitat Atul K (2013) Cryptography and network security. Tata McGraw-Hill Education, New York Atul K (2013) Cryptography and network security. Tata McGraw-Hill Education, New York
Zurück zum Zitat Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Privacy Trust Manag 3:11–22CrossRef Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Privacy Trust Manag 3:11–22CrossRef
Zurück zum Zitat Dagadita MA, Slusanschi EI, Dobre R (2013) Data hiding using steganography. In: 2013 IEEE 12th international symposium on parallel and distributed computing, pp 159–166 Dagadita MA, Slusanschi EI, Dobre R (2013) Data hiding using steganography. In: 2013 IEEE 12th international symposium on parallel and distributed computing, pp 159–166
Zurück zum Zitat Gambhir G, Mandal JK (2018) Shared memory implementation and scalability analysis of recursive positional substitution based on prime–non prime encryption technique. In: International conference, CICBA 2018. Springer, New York, pp 441–449 Gambhir G, Mandal JK (2018) Shared memory implementation and scalability analysis of recursive positional substitution based on prime–non prime encryption technique. In: International conference, CICBA 2018. Springer, New York, pp 441–449
Zurück zum Zitat Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907CrossRef Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907CrossRef
Zurück zum Zitat Greca S, Martiri E, Ahmad Khan MU, Chandhok C, Chaturvedi S (2012) Wu–Lee steganographic algorithm on binary images processed in parallel. IJVIPNS Int J Video Image Process 12(3):1–4 Greca S, Martiri E, Ahmad Khan MU, Chandhok C, Chaturvedi S (2012) Wu–Lee steganographic algorithm on binary images processed in parallel. IJVIPNS Int J Video Image Process 12(3):1–4
Zurück zum Zitat Kini NG, Kini VG (2019) A parallel algorithm to hide an image in an image for secured steganography. In: Integrated intelligent computing, communication and security, pp 585–594. Springer, Singapore Kini NG, Kini VG (2019) A parallel algorithm to hide an image in an image for secured steganography. In: Integrated intelligent computing, communication and security, pp 585–594. Springer, Singapore
Zurück zum Zitat Kwiatkowska M, Swierczewski L (2014) Steganography-coding and intercepting the information from encoded pictures in the absence of any initial information. arXiv preprint arXiv:1404.2237 Kwiatkowska M, Swierczewski L (2014) Steganography-coding and intercepting the information from encoded pictures in the absence of any initial information. arXiv preprint arXiv:​1404.​2237
Zurück zum Zitat Lawrence E, Bassham III (2010) NIST special publication 800-22 revision 1a, a statistical test suite for random and pseudorandom number generators for cryptographic application , p 131 Lawrence E, Bassham III (2010) NIST special publication 800-22 revision 1a, a statistical test suite for random and pseudorandom number generators for cryptographic application , p 131
Zurück zum Zitat Lin C, Zhong S (2013) A parallel method for stego image feature extraction on multicore CPU. In: 5th international conference on intelligent human–machine systems and cybernetics, vol 1, pp 536–540. IEEE, New York Lin C, Zhong S (2013) A parallel method for stego image feature extraction on multicore CPU. In: 5th international conference on intelligent human–machine systems and cybernetics, vol 1, pp 536–540. IEEE, New York
Zurück zum Zitat Parker Thomas S, Chua Leon O (1987) A tutorial for engineers. Proc IEEE 75(8):082–1008 Parker Thomas S, Chua Leon O (1987) A tutorial for engineers. Proc IEEE 75(8):082–1008
Zurück zum Zitat Patidar, Sud KK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441–452MathSciNetMATH Patidar, Sud KK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441–452MathSciNetMATH
Zurück zum Zitat Price GW, Lowenthal DK (2003) A comparative analysis of fine-grain threads packages. J Parallel Distrib Comput 63(11):1050–1063CrossRef Price GW, Lowenthal DK (2003) A comparative analysis of fine-grain threads packages. J Parallel Distrib Comput 63(11):1050–1063CrossRef
Zurück zum Zitat Sathawane V, Diwan T (2016) An optimized parallel computation of advanced encryption algorithm using open MP–a review. Int J Adv Res Comput Commun Eng 5(2):384–386 Sathawane V, Diwan T (2016) An optimized parallel computation of advanced encryption algorithm using open MP–a review. Int J Adv Res Comput Commun Eng 5(2):384–386
Zurück zum Zitat Sudeepa KB, Raju K, Ranjan K, Ghanesh A (2016) A new approach for video steganography based on randomization and parallelization. Proc Comput Sci 78:483–490 (Elsevier)CrossRef Sudeepa KB, Raju K, Ranjan K, Ghanesh A (2016) A new approach for video steganography based on randomization and parallelization. Proc Comput Sci 78:483–490 (Elsevier)CrossRef
Zurück zum Zitat Tutuncu K, Demirci B (2018) Adaptive LSB steganography based on chaos theory and random distortion. Adv Electr Comput Eng 18(3):15–22CrossRef Tutuncu K, Demirci B (2018) Adaptive LSB steganography based on chaos theory and random distortion. Adv Electr Comput Eng 18(3):15–22CrossRef
Zurück zum Zitat Usha BA (2018) High efficient data embedding in image steganography using parallel programming. In: Applications of security, mobile, analytic, and cloud (SMAC) technologies for effective information processing and management, pp 67–80. IGI Global, Hershey Usha BA (2018) High efficient data embedding in image steganography using parallel programming. In: Applications of security, mobile, analytic, and cloud (SMAC) technologies for effective information processing and management, pp 67–80. IGI Global, Hershey
Zurück zum Zitat Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–83CrossRef Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–83CrossRef
Metadaten
Titel
Multicore implementation and performance analysis of a chaos based LSB steganography technique
verfasst von
Gaurav Gambhir
Jyotsna Kumar Mandal
Publikationsdatum
12.02.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Microsystem Technologies / Ausgabe 11/2021
Print ISSN: 0946-7076
Elektronische ISSN: 1432-1858
DOI
https://doi.org/10.1007/s00542-020-04762-4

Weitere Artikel der Ausgabe 11/2021

Microsystem Technologies 11/2021 Zur Ausgabe

Neuer Inhalt