Analysis оf Parallel Computations Efficiency for User’s Private Multimedia Data Protection in Cloud




Multimedia data protection, Steganography


Background. A significant part of data stored in cloud storages is multimedia data. The procedure of data protection can be organized as a trusted cloud service. Since this service is an intermediate layer between user layer and cloud storage the time of data processing in it is a critical matter. To achieve decreasing of time required for data protection procedure, parallel computations can be employed.

Objective. The objective of the research is to evaluate and analyze the time efficiency of parallel computations fulfilling in multimedia data protection procedures.

Methods. The comparative analysis results for three methods, namely: data fragmentation method, complementary image method, and LSB-based method with AES encryption, are presented in the paper. The methods are considered in terms of data processing time efficiency. The impact of both stegobits used for data embedding and data parallel processing threads is analyzed. The comparison is carried out for two types of multimedia data – audio data and graphical data.

Results. The time efficiency characteristics obtained and analyzed in the research show that the use of parallel computations in the Complementary Image method enables the decreasing of data processing time up to 70%.

Conclusions. The presented results enable comparing the considered methods in terms of their realization as software tool that is, along with data protection level, important characteristic for cloud services user. The Complementary Image method with parallel data processing can be effectively used for multimedia data protection.

Author Biographies

Іван Андрійович Дичка, National Technical University "Kyiv Polytechnic Institute"

Ivan A. Dychka,

DSc, professor, Dean of Applied Mathematics Faculty


Семен Станіславович Широчин, Trinetix LLC

Semen S. Shyrochyn,

PhD, .Net Developer


Євгенія Станіславівна Сулема, National Technical University "Kyiv Polytechnic Institute"

Yevgeniya S. Sulema,

PhD, associate professor at Computer Systems Software Deaprtment



A. Cheddad et al., “Digital image steganography: survey and analysis of current methods”, Signal Processing, vol. 90, is. 3, pp. 727–752, 2010.

S. Bhattacharyya et al., “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier”, J. Global Res. Comp. Sci., vol. 2, no. 4, pp. 1–16, 2011.

Y. Sulema and S. Shyrochyn, “Method of image domain steganography with stegodata fragmentation and separation of private key”, Pravove, Normatyvne ta Metrolohichne Zabezpechennya Systemy Zakhystu Informatsiyi v Ukrayini, no. 1 (22), pp. 64–68, 2012 (in Ukrainian).

Y. Sulema and S. Shyrochyn, “Image steganography method based on complementary image”, Zakhyst informatsiyi, no. 4, pp. 345–353, 2013 (in Ukrainian).

S. Shyrochyn and Y. Sulema, “Method of steganographic data protection in audio-files based on complimentary image”, Visnyk NTUU “KPI”. Informatyka, Upravlinnya ta Obchyslyuval'na Tekhnika, no. 61, pp. 85–92, 2014 (in Ukrainian).

Y. Sulema and S. Shyrochyn, “Analysis of image protection algorithms parallel realization efficiency”, in Proc. Int. Sci. Conf. “Contemporary Problems of Computer Technologies”, Khmelnitsky, Ukraine, 2014, pp. 335–342 (in Ukrainian).

M. Kharrazi et al., “Performance study of common image steganography and steganalysis techniques”, J. Electronic Imaging, no. 15 (4), pp. 1–16, 2006.

A. Ker et al., “Moving steganography and steganalysis from the laboratory into the real world”, in Proc. 1st ACM Workshop IH&MMSec'13, 2013, pp. 45–58.

S.K. Bandyopadhyay and I.K. Maitra, “An application of palette based steganography”, Int. J. Comp. Applications, vol. 6, no. 4, pp. 24–27, 2010.

J. Daemen and V. Rijmen, The Design of Rijndael, AES – the Advanced Encryption Standard. Springer-Verlag, 2002, 238 p.

N.A. Ibraheem et al., “Understanding color models: a review”, ARPN J. Sci. Technol., vol. 2, no. 3, 2012, pp. 265–275.