2015
DOI: 10.12988/ces.2015.58230
|View full text |Cite
|
Sign up to set email alerts
|

Possibilities for steganographic parallel processing with a cluster system

Abstract: The paper suggests a parallel algorithm for the implementation of the LSB steganographic method. A program for cluster computer system in OpenMPI environment is implemented and an assessment of the acceleration of the program depending on the number of the computing cores that implement the program is made.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…One of them divided message and cover into several cores, then hiding message process implemented in parallel. Finally to make a complete stego image, pieces of cores were combined [11]. The parallel mechanism also implemented into FPGA device with creating instruction sets [13] and creating AVX instruction for vectorization [14].…”
Section: A Methods Development In Steganography and Cryptographymentioning
confidence: 99%
“…One of them divided message and cover into several cores, then hiding message process implemented in parallel. Finally to make a complete stego image, pieces of cores were combined [11]. The parallel mechanism also implemented into FPGA device with creating instruction sets [13] and creating AVX instruction for vectorization [14].…”
Section: A Methods Development In Steganography and Cryptographymentioning
confidence: 99%
“…The results in Table 6 demonstrate fast encryption time of the proposed algorithm (about 1,6 MB/sec.). Possible faster encryption could be achieved with parallel processing for multiple large text files [17,18].…”
Section: Key-sensitivity Analysismentioning
confidence: 99%
“…Different steganographic methods and algorithms have been developed and tested (Lokhande, 2014;Zhelezov, 2016;Zhelezov & Paraskevov, 2015). The template used for embedding information has a strong influence on the effectiveness of the steganography.…”
Section: Introductionmentioning
confidence: 99%