Analysis оf Parallel Computations Efficiency for User’s Private Multimedia Data Protection in Cloud

Іван Андрійович Дичка, Семен Станіславович Широчин, Євгенія Станіславівна Сулема

Abstract


Background. A significant part of data stored in cloud storages is multimedia data. The procedure of data protection can be organized as a trusted cloud service. Since this service is an intermediate layer between user layer and cloud storage the time of data processing in it is a critical matter. To achieve decreasing of time required for data protection procedure, parallel computations can be employed.

Objective. The objective of the research is to evaluate and analyze the time efficiency of parallel computations fulfilling in multimedia data protection procedures.

Methods. The comparative analysis results for three methods, namely: data fragmentation method, complementary image method, and LSB-based method with AES encryption, are presented in the paper. The methods are considered in terms of data processing time efficiency. The impact of both stegobits used for data embedding and data parallel processing threads is analyzed. The comparison is carried out for two types of multimedia data – audio data and graphical data.

Results. The time efficiency characteristics obtained and analyzed in the research show that the use of parallel computations in the Complementary Image method enables the decreasing of data processing time up to 70%.

Conclusions. The presented results enable comparing the considered methods in terms of their realization as software tool that is, along with data protection level, important characteristic for cloud services user. The Complementary Image method with parallel data processing can be effectively used for multimedia data protection.


Keywords


Multimedia data protection; Steganography

Full Text:

PDF

References


A. Cheddad et al., “Digital image steganography: survey and analysis of current methods”, Signal Processing, vol. 90, is. 3, pp. 727–752, 2010.

S. Bhattacharyya et al., “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier”, J. Global Res. Comp. Sci., vol. 2, no. 4, pp. 1–16, 2011.

Y. Sulema and S. Shyrochyn, “Method of image domain steganography with stegodata fragmentation and separation of private key”, Pravove, Normatyvne ta Metrolohichne Zabezpechennya Systemy Zakhystu Informatsiyi v Ukrayini, no. 1 (22), pp. 64–68, 2012 (in Ukrainian).

Y. Sulema and S. Shyrochyn, “Image steganography method based on complementary image”, Zakhyst informatsiyi, no. 4, pp. 345–353, 2013 (in Ukrainian).

S. Shyrochyn and Y. Sulema, “Method of steganographic data protection in audio-files based on complimentary image”, Visnyk NTUU “KPI”. Informatyka, Upravlinnya ta Obchyslyuval'na Tekhnika, no. 61, pp. 85–92, 2014 (in Ukrainian).

Y. Sulema and S. Shyrochyn, “Analysis of image protection algorithms parallel realization efficiency”, in Proc. Int. Sci. Conf. “Contemporary Problems of Computer Technologies”, Khmelnitsky, Ukraine, 2014, pp. 335–342 (in Ukrainian).

M. Kharrazi et al., “Performance study of common image steganography and steganalysis techniques”, J. Electronic Imaging, no. 15 (4), pp. 1–16, 2006.

A. Ker et al., “Moving steganography and steganalysis from the laboratory into the real world”, in Proc. 1st ACM Workshop IH&MMSec'13, 2013, pp. 45–58.

S.K. Bandyopadhyay and I.K. Maitra, “An application of palette based steganography”, Int. J. Comp. Applications, vol. 6, no. 4, pp. 24–27, 2010.

J. Daemen and V. Rijmen, The Design of Rijndael, AES – the Advanced Encryption Standard. Springer-Verlag, 2002, 238 p.

N.A. Ibraheem et al., “Understanding color models: a review”, ARPN J. Sci. Technol., vol. 2, no. 3, 2012, pp. 265–275.


GOST Style Citations


  1. Digital image steganography: survey and analysis of current methods / A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt // Signal Processing. – 2010 – 90, is. 3. – P. 727–752.

  2. Bhattacharyya S., Banerjee I., Sanyal G. A Survey of steganography and steganalysis technique in image, text, audio and video as cover carrier // J. Global Res. Comp. Sci. – 2011. – 2, № 4. – P. 1–16.

  3. Сулема Є.С., Широчин С.С. Спосіб стеганографії зображень з фрагментацією стегоданих та розділенням закритого ключа // Правове, нормативне та метрологічне забезпечення системи захисту інформації в Україні. – 2012. – Вип. 1 (22). – С. 64–68.

  4. Сулема Є.С., Широчин С.С. Спосіб стеганографії зображень на основі комплементарного образу // Захист інформації. – 2013. – Вип. 4. – С. 345–353.

  5. Сулема Є.С., Широчин С.С. Спосіб стеганографічного захисту даних в аудіо-файлах на основі комплементарного образу // Вісник НТУУ “КПІ”. Інформатика, управління та обчислювальна техніка. – 2014. – Вип. 61. – С. 85–92.

  6. Сулема Є.С., Широчин С.С. Аналіз ефективності паралельної реалізації алгоритмів захисту зображень // Зб. праць Міжнар. науково-практ. конф. “Актуальні проблеми комп’ютерних технологій”. – Хмельницький, 2014. – С. 64–68.

  7. Kharrazi M., Sencar H.T., Memon N. Performance study of common image steganography and steganalysis techniques // J. Electronic Imaging. – 2006. – № 15 (4). – P. 1–16.

  8. Moving steganography and steganalysis from the laboratory into the real world / A. Ker, P. Bas, R. Böhme et al. // Proc. 1st ACM Workshop IH&MMSec'13. – 2013. – P. 45–58.

  9. Bandyopadhyay S.K., Maitra I.K. An application of palette based steganography // Int. J. Comp. Applications. – 6, № 4. – 2010. – P. 24–27.

  10. Daemen J., Rijmen V. The Design of Rijndael, AES – the Advanced Encryption Standard. – Springer-Verlag, 2002. – 238 p.

  11. Understanding color models: a review / N.A. Ibraheem, M.M. Hasan, R.Z. Khan, P.K. Mishra // ARPN J. Sci. Technol. – 2012. – 2, № 3. – P. 265–275.




DOI: http://dx.doi.org/10.20535/1810-0546.2016.1.60749

Refbacks

  • There are currently no refbacks.


Copyright (c) 2017 NTUU KPI