Hardware-Accelerated Least Significant Bit Framework: A Low Cost Approach to Securing Clinical Data
DOI:
https://doi.org/10.31449/inf.v48i22.5583Abstract
Information Technology is continuously making communication much easier thereby drawing the interest of millions of users, including medics, to data communications. However, security of the information communicated still remains issues of concern, especially when it comes to patients’ confidential information. Apparently, various concepts have being proposed to solving most of the problems of information security, such as the cryptography and the steganography. Image steganography approach focuses on concealing the existence of information from unintended person. Least Significant Bit (LSB) approach of hiding data is one of the most popular in this regards but with weakness of low embedding capacity and therefore low security. Consequently, there have been several attempts by researchers to improving the embedding capacity and low security in LSB. This study therefore proposes hardware-accelerated steganography data hiding framework towards addressing the weaknesses of low security and embedding capacity exhibited in LSB data hiding approach. Within Compute Unified Device Architecture (CUDA), the proposed framework was able to conceal secret data using the LSB approach where the pixels of the cover image and the secret data were converted into their equivalent binary bits, and the binary bits grouped into bytes of 8-bits each. The LSB of the cover image was replaced with the bits of the secret data starting with the most significant bit of each byte of 8-bit of the secret data, until the whole data is fully embedded in the cover image to generate the stego-image. The proposed framework was further evaluated for possible security of the embedded secret data by encrypting the stego-image with password. The experimental results show that the images in PNG, JPG and JPEG format tend to embed and hide the secret data successfully but with increase in the size of the generated stego-image, while images in TIFF and BMP format tend to embed and hide the secret data successfully and retain their original sizes. Interestingly, the entire data hiding stages were achieved within 3s for up to 110KB of data and not more than 4s for 192KB.Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika