Open Access Open Access  Restricted Access Subscription or Fee Access

Conversion of 2D Stegano Images into a 3D Stereo Image using RANSAC

P. Mathivanan, M. Shrikalaa, J.S. Leena Jasmine

Abstract


A novel steganography method with maximum data hiding capacity using point feature matching is performed in our proposed method. In order to increase data hiding, 2D Anaglyphic stereography images are used for this process. The 2D Anaglyphic stereo input images of different colours and coloured filters in front of each eye allows only the appropriate image to pass. Some international standards body has decided that the right eye filter should be blue, while the left eye filter is red, but this can vary. In our process these input images are obtained by a simple process, here adjacent frames from an input video is taken. The individually obtained adjacent frames act similar to stereo inputs, further these input images are subjected to preprocessing for better stegano process are individually steganoed with a secret data (image). The data hiding process is obtained by a simple method of stegano algorithm called LSB (Least Significant bit), here LSB bit of our cover image is replaced by a secret data. Later this individual stereo images with secret data is applied to Stabilization Using Point Feature Matching, this stabilization algorithm involves two steps. First, we determine the affine image transformations between all neighbouring frames of a video sequence using a Random Sampling and Consensus (RANSAC) [1] procedure applied to point correspondences between two images. Second, we warp the embedded 2D Anaglyphic steganoed images to achieve a stabilized 3D stereo image with high data hiding capability, which contains two secret data in a single 3D stereo image.

Keywords


2DAnaglyphic Stereo Images, LSB, Random Sampling and Consensus (RANSAC)

Full Text:

PDF

References


S.K.Moon, R.S.Kawitkar “Data Security using Data Hiding”International Conference on Computational Intelligence and Multimedia Applications– 2007.

Imran Sarwar Bajwa , Rubata Riasat “A New Perfect Hashing based Approach for Secure Steganograph” IEEE – 2011 pp:178.

Er.Rishma, Er.Lakhvir Singh , Er.Krishma Bhuchar “Biogeography Based Steganography For Color Images” IJARCSEE 2012.

Beenish Mehboob, Rashid Aziz Faruqui “A Steganography Implementation” IEEE – 2008

R.Amirtharajan , Sandeep Kumar Behera , Motamaari Abhilash Swarup “Colour Guided Colour Image Steganography” Universal Journal of computer Science and Engineering Technology – Oct 2011

Rosziati Ibrahim and Teoh Suk Kuan “Steganography Algorithm to Hide Secret Message inside an Image” Computer Technology and Application 2 (2011) 102-108. Transform”- IEEE 2009.

Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav “Steganography Using Least Signicant Bit Algorithm” International Journal of Engineering Research and Applications (IJERA) May-Jun 2012, pp. 338-341.

R.O. EI Safy H. H. Zayed, EI Dessouki “An Adaptive Steganographic Technique Based on Integer Wavelet

Lokeswara Reddy, Dr. A. Subramanyam, Dr.P. Chenna Reddy “ Implementation of LSB Steganography and its Evaluation for Various File Formats” Int. J. Advanced Networking and Applications , Pages: 868-872 (2011).

Amirthanjan,R. Akila,R & Deepikachowdavarapu, P., 2010. A ComparativeAnalysis of Image Steganography, International Journal of Computer Application, 2(3), pp.2-10.

Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image. International Journal of Advancements in Technology, 1(1), pp.05-11.

Bloom,J. A. et al.,2008. Digital watermarking and Steganography. 2nd ed. Morgan Kaufmann. Bishop, M., 2005. Introduction to computer security. 1st ed. Pearson publications.

Chan, C.K. Cheng, L.M., 2004. Hiding data in images by simple lsb substitution: pattern recognition.vol 37. Pergamon.

Cox, I. Miller, M. Bloom, J. Fridrich, J & Kalker, T. 2008. Digital watermarking and Steganography. 2nd Ed. Elsevi

Namita TiwarI, Dr.Madhu Shandilya “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format”International Journal of Computer Applications (0975 – 8887) , September 2010.

Rahul Raguram , Jan-Michael Frahm , and Marc Pollefeys “A Comparative Analysis of RANSAC Techniques Leading to Adaptive Real-Time Random Sample Consensus” Springer-Verlag Berlin Heidelberg 2008 pp. 500–513.

Marco Zuliani, RANSAC 4 Dummies, August 13, 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.