Comprehensive survey of 3D image steganography techniques

被引:0
作者
Girdhar A. [1 ]
Kumar V. [1 ]
机构
[1] Computer Science and Engineering Department, Thapar University, Punjab, Patiala
关键词
Steganography;
D O I
10.1049/IET-IPR.2017.0162
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents an overview of various three-dimensional (3D) image steganography techniques from survey point of view. The authors present taxonomy of 3D image steganography techniques and identify the recent advances in this field. Steganalysis and attacks on 3D image steganography algorithms have also been studied. 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks. Some challenges which inhibit the development of 3D steganography algorithms have been identified. This study concludes with some useful findings in the end. A comprehensive survey on 3D image steganography techniques, to the best of the authors’ knowledge, is not available and thus it suffices the need of this study. © The Institution of Engineering and Technology 2017.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 67 条
  • [1] Stanley A., ‘Pairs of Values and the Chi-Squared Attack, (2005)
  • [2] Cheddad A., Condell J., Curran K., Et al., Digital image steganography: Survey and analysis of current methods, Signal Process, 90, 3, pp. 727-752, (2010)
  • [3] Subhedar M.S., Mankar V.H., Current status and key issues in image steganography: A survey, Comput. Sci. Rev., 13-14, pp. 95-113, (2014)
  • [4] Johnson N.F., Jajodia S., Exploring steganography: Seeing the unseen, Computer, 31, 2, pp. 26-34, (1998)
  • [5] Terror plot horror hidden in porn film, Adelaide Now, (2012)
  • [6] Kolata G., Veiled messages of terror may lurk in cyberspace, Science, (2001)
  • [7] McCullagh D., Bin Laden: Steganography master?, WIRED
  • [8] Shi Y., Li X., Zhang X., Et al., Reversible data hiding: Advances in the past two decades, IEEE Access, 4, pp. 3210-3237, (2016)
  • [9] Johnson N., Duric Z., Jajodia S., ‘Information Hiding: Steganography and Watermarking Attacks and Countermeasures, (2000)
  • [10] Wayner P., Disappearing Cryptography, (2009)