Applications Transformation Model for MapReduce Information Hiding

被引:2
作者
Lo, Hsiang-Fu [1 ]
Liu, Fong-Hao [2 ]
Lee, Wei-Tsong [3 ]
Liu, Chiang-Lung [4 ]
Chou, Yen-Chen [5 ]
Anpalagan, Alagan [6 ]
机构
[1] Natl Def Univ, Chung Cheng Inst Technol, Sch Def Sci, Taoyuan, Taiwan
[2] Natl Def Univ, Dept Informat Management, Taoyuan, Taiwan
[3] Tamkang Univ, Dept Elect & Comp Engn, New Taipei, Taiwan
[4] Natl Def Univ, Chung Cheng Inst Technol, Dept Elect & Elect Engn, Taoyuan, Taiwan
[5] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
[6] Ryerson Univ, Elect & Comp Engn Dept, Toronto, ON, Canada
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 01期
关键词
MapReduce; Cloud computing; Application transformation model; Information hiding; LSB;
D O I
10.6138/JIT.2017.18.1.20160514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of smart mobile devices and the advancement of network and cloud computing technologies, it is unavoidable for traditional information hiding techniques applications, including digital watermarking, digital evidence and digital forensics, to face new challenges. Moreover, the International Data Corporation (IDC) report shows that the amounts of digital data will double every two years in the future, namely that the growth rate of multimedia is rapidly increasing. Therefore, the development of MapReduce information hiding applications transformation technique to deal with a huge amount of digital data would be a critical research issue. In this paper, Applications Transformation for MapReduce Information Hiding (AT-MIH) model is proposed to migrate information hiding applications into MapReduce framework and is proven by realizing an experimental system, a MapReduce-based Least Significant Bit (MR-LSB) as a case study. Experiments results show that the MR-LSB constructed by using AT-MIH model increases by a factor of 8.7X total execution time compared to traditional non-MapReduce method.
引用
收藏
页码:157 / 164
页数:8
相关论文
共 24 条
  • [1] Alturki F, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P542, DOI 10.1109/ICIP.2001.958548
  • [2] [Anonymous], 2010, P 2010 INT C COMP IN
  • [3] [Anonymous], 2003, P 19 ACM S OP SYST P, DOI [10.1145/1165389.945450, DOI 10.1145/1165389.945450]
  • [4] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [5] A steganographic method based upon JPEG and quantization table modification
    Chang, CC
    Chen, TS
    Chung, LZ
    [J]. INFORMATION SCIENCES, 2002, 141 (1-2) : 123 - 138
  • [6] Bigtable: A distributed storage system for structured data
    Chang, Fay
    Dean, Jeffrey
    Ghemawat, Sanjay
    Hsieh, Wilson C.
    Wallach, Deborah A.
    Burrows, Mike
    Chandra, Tushar
    Fikes, Andrew
    Gruber, Robert E.
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2008, 26 (02):
  • [7] Chao-Tung Yang, 2010, 2010 International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010), P1, DOI 10.1109/ISPA.2010.96
  • [8] Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
  • [9] Douceur JR, 1999, PERFORMANCE EVALUATION REVIEW, SPECIAL ISSUE, VOL 27 NO 1, JUNE 1999, P59, DOI 10.1145/301464.301480
  • [10] Feng J.B., 2006, IJ Network Security, V2, P161