Skip to main content
Log in

Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map

  • Original Article
  • Published:
Innovations in Systems and Software Engineering Aims and scope Submit manuscript

Abstract

Concealing secret information in an image so that any perceptible evidence of the image alteration is insignificant, is known as image steganography. Image steganography can be implemented with either spatial or transform domain techniques. Spatial domain-based algorithms, generally the most widely used ones, refer to the process of embedding the secret information in the least significant bit positions of the cover image pixels. This paper proposes a chaotic tent map-based bit embedding as a novel steganography algorithm with a multicore implementation. The potential reasons for using chaotic maps in image steganography are sensitivity of these functions to initial conditions and control parameters. The computational complexity of the sequential least significant bit algorithm is known to be O(n). Hence, time complexity of the encryption/decryption algorithm is also a very important aspect. With the advantages offered by multicore processors, the proposed steganography algorithm can now be explicitly parallelized using the OpenMP API. As a pre-embedding operation, the quality of the randomness of the chaotic number sequences is tested with a NIST cryptographic test suite. The quality of the stego image is validated with statistical parameters such as structural similarity index (SSIM), mean square error (MSE) and peak signal-to-noise ratio (PSNR). Moreover, exploiting data parallelism inherent in the algorithm, multicore implementation of the algorithm with OpenMP API has also been reported. Proposed parallel version of the technique has been tested on five test samples of images for scalability analysis and results indicate significant speed up as compared to the sequential implementation of the technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Tutuncu K, Demirci B (2018) Adaptive LSB steganography based on chaos theory and random distortion. Adv Electr Comput Eng 18:15–22. https://doi.org/10.4316/AECE.2018.03003

    Article  Google Scholar 

  2. Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education

    Google Scholar 

  3. Abutaha M (2017) Real-time and portable chaos-based crypto-compression systems for efficient embedded architectures. Dissertation, University of Nantes, France

  4. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483. https://doi.org/10.1016/j.compeleceng.2015.11.008

    Article  Google Scholar 

  5. Hussain M. A., Bora P. (2018). A highly secure digital image steganography technique using chaotic logistic map and support image. In: IEEE international conference on information communication and signal processing (ICICSP), pp 69–73. https://doi.org/10.1109/ICICSP.2018.8549790

  6. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284. https://doi.org/10.1142/s021812749800098x

    Article  MathSciNet  MATH  Google Scholar 

  7. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25. https://doi.org/10.1016/j.optlaseng.2015.09.007

    Article  Google Scholar 

  8. Radwan AG, Abd-El-Hafiz SK (2013) Image encryption using generalized tent map. In: 2013 IEEE 20th international conference on electronics, circuits and systems (ICECS), pp 653–656

  9. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127–133. https://doi.org/10.1007/s11071-016-3030-8

    Article  Google Scholar 

  10. Bandyopadhyay D, Dasgupta K, Mandal JK, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Priv Trust Manag 3:11–22. https://doi.org/10.5121/IJSPTM.2014.3102

    Article  Google Scholar 

  11. Gambhir G, Mandal JK (2020) Multicore implementation and performance analysis of a chaos based LSB steganography technique. Microsyst. Technol. 9:99. https://doi.org/10.1007/s00542-020-04762-4

    Article  Google Scholar 

  12. Strogatz SH (1994) Nonlinear dynamics and chaos. Perseus Books, Reading

    Google Scholar 

  13. Parker TS, Chua LO (1987) Chaos: a tutorial for engineers. Proc IEEE 75:982–1008. https://doi.org/10.1109/PROC.1987.13845

    Article  Google Scholar 

  14. Yoshida T, Mori H, Shigematsu H (1983) Analytic study of chaos of the tent map: band structures, power spectra, and critical behaviors. J Stat Phys 31:279–308. https://doi.org/10.1007/BF01011583

    Article  MathSciNet  Google Scholar 

  15. Bassham LE III, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Heckert NA (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology. https://doi.org/10.6028/nist.sp.800-22

    Book  Google Scholar 

  16. Gambhir G, Mandal JK (2019) Shared memory implementation and scalability analysis of recursive positional substitution based on prime-non prime encryption technique. In: Mandal J, Mukhopadhyay S, Dutta P, Dasgupta K (eds) Computational intelligence, communications and business analytics (CICBA). Communications in computer and information science. Springer, Singapore, pp 441–449

    Google Scholar 

  17. Liu X, Mellor-Crummey J, Fagan M (2013) A new approach for performance analysis of OpenMP programs. In: ICS '13: proceedings of the 27th international ACM conference on International conference on supercomputing, pp 69–80. https://doi.org/10.1145/2464996.2465433

  18. Chandra R et al (2001) Parallel programming in OpenMP. Academic Press

    Google Scholar 

  19. IIT Delhi Supercomputing Centre, New Delhi. http://supercomputing.iitd.ac.in/

  20. http://www.eso.org/public/images. Last accessed 20 Mar 2020. Accessed 5 Feb 2020.

  21. Eijkhout V (2013) Introduction to high performance scientific computing. https://pages.tacc.utexas.edu/~eijkhout/Articles/EijkhoutIntroToHPC.pdf. Accessed 25 Feb 2020.

  22. Predicting and measuring parallel performance. https://software.intel.com/en-us/articles/predicting-and-measuring-parallel-performance/. Accessed 6 Mar 2020.

  23. Ogras H (2019) An efficient steganography technique for images using chaotic bitstream. Int J Comput Netw Inf Secur 11:21–27. https://doi.org/10.5815/ijcnis.2019.02.03

    Article  Google Scholar 

  24. Battikh D, ElAssad S, Bakhache B, Déforges O, Khalil M (2014) Chaos-based spatial steganography system for Images. Int J Chaotic Comput 3:36–44. https://doi.org/10.20533/ijcc.2046.3359.2014.0005

    Article  Google Scholar 

Download references

Acknowledgements

The authors are thankful to the anonymous reviewers for their invaluable comments for improving the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Gambhir.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gambhir, G., Mandal, J.K. Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map. Innovations Syst Softw Eng 17, 333–342 (2021). https://doi.org/10.1007/s11334-021-00385-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11334-021-00385-8

Keywords

Navigation