LSB-Steganography Framework for Stereoscopic Images based on BJND

被引:0
作者
Roberto Noriega-Galeana, Luis [1 ]
Reyes-Reyes, Rogelio [1 ]
Ponomaryov, Volodymyr [1 ]
Cruz-Ramos, Clara [1 ]
机构
[1] Inst Politecn Nacl, ESIME Culhuacan, Secc Estudios Posgrad & Invest, Seguridad & Tecnol Informac, Av Santa Ana 1000, Culhuacan, DF, Mexico
来源
2017 14TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE) | 2017年
关键词
Stereoscopic Images; 3D Images; BJND; steganography; payload capacity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, stereoscopic images are commonly used for 3D image generation, these are composed by a pair of images viewed independently by each eye, which creates a feeling of immersion and in depth perception. 3D vision technologies have multiple applications in many different areas such as medicine, entertainment, computer vision, etc.; being accessible to a wider group of people. However, there is so few researches that seek to hide information in this type of 3D content. This paper proposes a new method to hide information into stereoscopic images using a LSB-Steganography technique and a Binocular Just Noticeable Difference model (BJND) embedding the maximum payload capacity avoiding visual artifacts and inaccurate 3D generation. Results demonstrate that it is possible to embed up to 1.87 Mb into the stereoscopic images keeping high imperceptibility, obtaining average values for PSNR and SSIM between the original stereoscopic pair and the modified of 31.12dB and 0.9693, respectively. Quantity Bad Pixels (QBP, delta(d) = 0.5) and SSIM are calculated for evaluating accurate 3D generation, obtaining average values of 41.26% and of 0.7721 between the ground-truth and the disparity map of the modified stereoscopic pair.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] CHAOS BASED CRYPTOGRAPHY AND RECTANGULAR SHAPE BASED STEGANOGRAPHY TECHNIQUE USING LSB
    Aiswarya, S.
    Gomathi, R.
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2023, 36 (04)
  • [32] A Scheme of LSB Steganography Based on Concept of Finding Optimization Pixels Selection
    Sun, Jianhong
    Li, Yingjiang
    Zhong, Xiaohui
    Li, Junsheng
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 155 - +
  • [33] DETECTION OF ±1 LSB STEGANOGRAPHY BASED ON THE AMPLITUDE OF HISTOGRAM LOCAL EXTREMA
    Cancelli, Giacomo
    Doerr, Gwenael
    Cox, Ingemar J.
    Barni, Mauro
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 1288 - 1291
  • [34] A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks
    Badhan, Savita
    Juneja, Mamta
    INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 183 - 190
  • [35] Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain
    Gera A.
    Vyas V.
    Recent Patents on Engineering, 2022, 16 (02)
  • [36] A Hybrid Steganography Method using 3LSB Substitution on Sub-Images based on a Key-Matrix
    Ashwin, K.
    Vignesh, P.
    Reddy, Rajasekhar M.
    Ravichandran, K. S.
    2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2018,
  • [37] Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption
    Juneja, Mamta
    Sandhu, Parvinder Singh
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 302 - 305
  • [38] High-capacity adaptive steganography based on LSB and Hamming code
    Wang, Yanting
    Tang, Mingwei
    Wang, Zhen
    OPTIK, 2020, 213 (213):
  • [39] Steganalysis of AE-LSB Steganography Based on Pixel Value Differencing
    Zhu, Zhenhao
    Zhang, Tao
    Zhu, Pengwei
    Wan, Baoji
    Hou, Xiaodan
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 1449 - 1453
  • [40] An Evaluation of MP3 Steganography Based on Modified LSB Method
    Indrayani, Rini
    Nugroho, Hanung Adi
    Hidayat, Risanuri
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2017, : 257 - 260