Parallel Execution of the Steganography using SFLA on the Android Platform

Main Article Content

Manar Younis Ahmed
Balqees Talal Hasan


Steganography,Parallel Processing,SFLA,Sketch Images


A single core processors have become part of the past, processors manufacturers have continued of producing multi_core processors for many devices such as smart phones and tablets. By this act ,they enabled developers to develop multi-threaded application  to speed up the work and increase efficiency of their applications.

The goal of this research is to exploit the principles of parallel processing to construct integrated steganography application, which is running on the android platform. The research begins by providing a new suggested method for creating sketch images, as a cover for the secret data. The advanced encryption standard algorithm, which is provided by the Java Encryption Extension package, was used to encrypt the secret data and then the Shuffled Frog Leaping Algorithm was used to search for the best positions in the sketch image where the secret data can be embedded. It was developed here to work in parallel on quad-core processors. New embedding methods were proposed to embed the secret data based on the fitness of the best frog obtained from the SFLA . the embedding and extracting processes were done in parallel manner. Finally, this research provides the possibility of sending the stego image directly through techniques and some image-sending apps installed on the device .

The highest speed up obtained when applying the SFLA algorithm in parallel manner was (3.72) and the highest efficiency was (0.93) while the highest speed up in the embedding process was (3.3), and the highest efficiency was (0.82) and the the highest speed up in the extracting  process, was (2.21), and the highest efficiency was (0.55). The highest result of the proposed embedding way  which reached it the PSNR measure was (81.3071 db) and the lowest measure was (0.00048).

Abstract 33 | PDF Downloads 34


Android OS Will Stay on #1 Position in 2017. Retrieved 19 January 2019, from
Bucerzan Said, Nagham Tharwat, (2012), "Information Hiding using Parallel Algorithms", Journal of Education and Science, Faculty of Education, University of Mosul, vol. 25, no. 1, pp. 151-112125X: ISSN.
Curran K., and Bailey K., (2003), "An Evaluation of Image Based Steganography Methods", International Journal of Digital Evidence, Vol.2, Issue 2, pp. 1-40.
D., Raţiu C., and Manolescu M., (October 2013), "SmartSteg: A New Android Based Steganography Application", International Journal of Computers, Communications & Control, Vol. 8, Issue 5, pp.681-688, CCC Publications, ISSN: 1841-9836.
Domeika M., (2008),"Software Development for Embedded Multi-core Systems", Newnes, Burlington, USA, ISBN 978-0-7506-8539-9.
Elbeltagi E., Hegazy T., and Grierson D., (March 2007), "A Modified Shuffled Frog-Leaping Optimization Algorithm: Applications to Project Management", Journal of Structure and Infrastructure Engineering, ISSN: 1573-2479, Vol. 3, No. 1, pp. 53-60.
Geng W., (2010), "The Algorithms and Principles of Non-photorealistic Graphics: Artistic Rendering and Cartoon Animation", 1st Edition, Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-04890-6.
Habibi M., Karimi R., and Nosrati M., (March 2013), "Using SFLA and LSB for Text Message Steganography in 24-Bit RGB Color Images", International Journal of Engineering Sciences, ISSN: 2306-6474, Vol. 2, No. 3, pp. 68-75.
Java Cryptography Architecture (JCA) Reference Guide from
Kika A., and Greca S., (2013), "Multithreading Image Processing in Single-core and Multi-core CPU using Java", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 9, pp. 165-169.
Kshirsagar G. R., and Kulkarni S., (March 2013), "Real Time Implementation of Secured Multimedia Messaging Service System using Android", International Journal of Scientific and Research Publications, ISSN: 2250-3153 , Vol. 3, Issue 3.
Savithri G., and Sudha K. L., (July 2014),"Android Application for Secret Image Transmission and Reception using Chaotic Steganography", International Journal of Innovative Research in Computer and Communication Engineering , ISSN:2320-9798, Vol. 2, Issue 7, pp. 5107-5113 .
Sousa M. C., and Buchanan J. W., (1999), "Observational Models of Graphite Pencil Materials", The Eurographics Association and Blackwell, Malden, USA, Vol. 18.
Winnemolle H., Kyprianidis J. E., and Olsen S. C., (2012), "XDoG: An Extended Difference-of-Gaussians Compendium Including Advanced Image Stylization", Computers & Graphics, Vol. 36, Issue 6, pp. 720-753.
Zhelezov S. and Paraskevov H., (2015) "Possibilities for Steganographic Parallel Processing with a Cluster System", Contemporary Engineering Sciences, Vol. 8, , no. 18, 809 – 816.
Zhou J., and Li B., (2005), "Automatic Generation of Pencil Sketch Like Drawings from Personal Photos", IEEE International Conference on Multimedia and Expo, pp. 1026-1029.