Skip to main content
Erschienen in: Innovations in Systems and Software Engineering 4/2021

11.03.2021 | Original Article

Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map

verfasst von: Gaurav Gambhir, Jyotsna Kumar Mandal

Erschienen in: Innovations in Systems and Software Engineering | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Concealing secret information in an image so that any perceptible evidence of the image alteration is insignificant, is known as image steganography. Image steganography can be implemented with either spatial or transform domain techniques. Spatial domain-based algorithms, generally the most widely used ones, refer to the process of embedding the secret information in the least significant bit positions of the cover image pixels. This paper proposes a chaotic tent map-based bit embedding as a novel steganography algorithm with a multicore implementation. The potential reasons for using chaotic maps in image steganography are sensitivity of these functions to initial conditions and control parameters. The computational complexity of the sequential least significant bit algorithm is known to be O(n). Hence, time complexity of the encryption/decryption algorithm is also a very important aspect. With the advantages offered by multicore processors, the proposed steganography algorithm can now be explicitly parallelized using the OpenMP API. As a pre-embedding operation, the quality of the randomness of the chaotic number sequences is tested with a NIST cryptographic test suite. The quality of the stego image is validated with statistical parameters such as structural similarity index (SSIM), mean square error (MSE) and peak signal-to-noise ratio (PSNR). Moreover, exploiting data parallelism inherent in the algorithm, multicore implementation of the algorithm with OpenMP API has also been reported. Proposed parallel version of the technique has been tested on five test samples of images for scalability analysis and results indicate significant speed up as compared to the sequential implementation of the technique.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education
3.
Zurück zum Zitat Abutaha M (2017) Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures. Dissertation, University of Nantes, France Abutaha M (2017) Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures. Dissertation, University of Nantes, France
8.
Zurück zum Zitat Radwan AG, Abd-El-Hafiz SK (2013) Image encryption using generalized tent map. In: 2013 IEEE 20th international conference on electronics, circuits and systems (ICECS), pp 653–656 Radwan AG, Abd-El-Hafiz SK (2013) Image encryption using generalized tent map. In: 2013 IEEE 20th international conference on electronics, circuits and systems (ICECS), pp 653–656
12.
Zurück zum Zitat Strogatz SH (1994) Nonlinear dynamics and chaos. Perseus Books, Reading Strogatz SH (1994) Nonlinear dynamics and chaos. Perseus Books, Reading
16.
Zurück zum Zitat Gambhir G, Mandal JK (2019) Shared memory implementation and scalability analysis of recursive positional substitution based on prime-non prime encryption technique. In: Mandal J, Mukhopadhyay S, Dutta P, Dasgupta K (eds) Computational intelligence, communications and business analytics (CICBA). Communications in computer and information science. Springer, Singapore, pp 441–449 Gambhir G, Mandal JK (2019) Shared memory implementation and scalability analysis of recursive positional substitution based on prime-non prime encryption technique. In: Mandal J, Mukhopadhyay S, Dutta P, Dasgupta K (eds) Computational intelligence, communications and business analytics (CICBA). Communications in computer and information science. Springer, Singapore, pp 441–449
17.
18.
Zurück zum Zitat Chandra R et al (2001) Parallel programming in OpenMP. Academic Press Chandra R et al (2001) Parallel programming in OpenMP. Academic Press
Metadaten
Titel
Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map
verfasst von
Gaurav Gambhir
Jyotsna Kumar Mandal
Publikationsdatum
11.03.2021
Verlag
Springer London
Erschienen in
Innovations in Systems and Software Engineering / Ausgabe 4/2021
Print ISSN: 1614-5046
Elektronische ISSN: 1614-5054
DOI
https://doi.org/10.1007/s11334-021-00385-8

Premium Partner