Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography

Information security has been one of the major concerns in the field of communication today. Steganography is one of the ways used for secure communication, where people cannot feel the existence of the secret information. The need for parallelizing an algorithm increases, as any good algorithm becomes a failure if the computation time taken by it is large. In this paper two parallel algorithms—parallel RSA (Rivest Shamir Adleman) cryptosystem with 2D-DCT (Discrete Cosine Transformation) steganography and parallel chaotic 2D-DCT steganography—have been proposed. The performance of both algorithms for larger images is determined and chaotic steganography is proved to be an efficient algorithm for larger messages. The parallelized version also proves to have reduced processing time than serial version with the speed-up ratios of 1.6 and 3.18.

[1]  Safwan El Assad,et al.  Enhancement using chaos of a steganography method in DCT domain , 2015, 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).

[2]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[3]  K. L. Sudha,et al.  Text Steganography using LSB insertion method along with Chaos Theory , 2012, ArXiv.

[4]  Shamim Ahmed Laskar High Capacity data hiding using LSB Steganography and Encryption , 2012 .

[5]  Gautam Sanyal,et al.  A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier , 2011 .

[6]  Md. Ismail Hossain,et al.  A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[7]  A. E. S. Hafez,et al.  A new chaos steganography algorithm for hiding multimedia data , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[8]  Bhanu Kapoor,et al.  State of the art parallel approaches for RSA public key based cryptosystem , 2015, ArXiv.

[9]  Samir B. Patel,et al.  A novel approach for implementing Steganography with computing power obtained by combining Cuda and Matlab , 2009, ArXiv.

[10]  C. Chantrapornchai,et al.  On the comparison of digital image steganography algorithm based on DCT and wavelet , 2013, 2013 International Computer Science and Engineering Conference (ICSEC).

[11]  Abu Asaduzzaman,et al.  A promising parallel algorithm to manage the RSA decryption complexity , 2015, SoutheastCon 2015.

[12]  Arjuna Madanayake,et al.  A Single-Channel Architecture for Algebraic Integer-Based 8 $\,\times\,$8 2-D DCT Computation , 2013, IEEE Transactions on Circuits and Systems for Video Technology.