Analysis оf Parallel Computations Efficiency for User’s Private Multimedia Data Protection in Cloud
DOI:
https://doi.org/10.20535/1810-0546.2016.1.60749Keywords:
Multimedia data protection, SteganographyAbstract
Background. A significant part of data stored in cloud storages is multimedia data. The procedure of data protection can be organized as a trusted cloud service. Since this service is an intermediate layer between user layer and cloud storage the time of data processing in it is a critical matter. To achieve decreasing of time required for data protection procedure, parallel computations can be employed.
Objective. The objective of the research is to evaluate and analyze the time efficiency of parallel computations fulfilling in multimedia data protection procedures.
Methods. The comparative analysis results for three methods, namely: data fragmentation method, complementary image method, and LSB-based method with AES encryption, are presented in the paper. The methods are considered in terms of data processing time efficiency. The impact of both stegobits used for data embedding and data parallel processing threads is analyzed. The comparison is carried out for two types of multimedia data – audio data and graphical data.
Results. The time efficiency characteristics obtained and analyzed in the research show that the use of parallel computations in the Complementary Image method enables the decreasing of data processing time up to 70%.
Conclusions. The presented results enable comparing the considered methods in terms of their realization as software tool that is, along with data protection level, important characteristic for cloud services user. The Complementary Image method with parallel data processing can be effectively used for multimedia data protection.
References
A. Cheddad et al., “Digital image steganography: survey and analysis of current methods”, Signal Processing, vol. 90, is. 3, pp. 727–752, 2010.
S. Bhattacharyya et al., “A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier”, J. Global Res. Comp. Sci., vol. 2, no. 4, pp. 1–16, 2011.
Y. Sulema and S. Shyrochyn, “Method of image domain steganography with stegodata fragmentation and separation of private key”, Pravove, Normatyvne ta Metrolohichne Zabezpechennya Systemy Zakhystu Informatsiyi v Ukrayini, no. 1 (22), pp. 64–68, 2012 (in Ukrainian).
Y. Sulema and S. Shyrochyn, “Image steganography method based on complementary image”, Zakhyst informatsiyi, no. 4, pp. 345–353, 2013 (in Ukrainian).
S. Shyrochyn and Y. Sulema, “Method of steganographic data protection in audio-files based on complimentary image”, Visnyk NTUU “KPI”. Informatyka, Upravlinnya ta Obchyslyuval'na Tekhnika, no. 61, pp. 85–92, 2014 (in Ukrainian).
Y. Sulema and S. Shyrochyn, “Analysis of image protection algorithms parallel realization efficiency”, in Proc. Int. Sci. Conf. “Contemporary Problems of Computer Technologies”, Khmelnitsky, Ukraine, 2014, pp. 335–342 (in Ukrainian).
M. Kharrazi et al., “Performance study of common image steganography and steganalysis techniques”, J. Electronic Imaging, no. 15 (4), pp. 1–16, 2006.
A. Ker et al., “Moving steganography and steganalysis from the laboratory into the real world”, in Proc. 1st ACM Workshop IH&MMSec'13, 2013, pp. 45–58.
S.K. Bandyopadhyay and I.K. Maitra, “An application of palette based steganography”, Int. J. Comp. Applications, vol. 6, no. 4, pp. 24–27, 2010.
J. Daemen and V. Rijmen, The Design of Rijndael, AES – the Advanced Encryption Standard. Springer-Verlag, 2002, 238 p.
N.A. Ibraheem et al., “Understanding color models: a review”, ARPN J. Sci. Technol., vol. 2, no. 3, 2012, pp. 265–275.
Downloads
Published
Issue
Section
License
Copyright (c) 2017 NTUU KPI Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under CC BY 4.0 that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work