Comprehensive survey of 3D image steganography techniques

被引:0
作者
Girdhar A. [1 ]
Kumar V. [1 ]
机构
[1] Computer Science and Engineering Department, Thapar University, Punjab, Patiala
关键词
Steganography;
D O I
10.1049/IET-IPR.2017.0162
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents an overview of various three-dimensional (3D) image steganography techniques from survey point of view. The authors present taxonomy of 3D image steganography techniques and identify the recent advances in this field. Steganalysis and attacks on 3D image steganography algorithms have also been studied. 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks. Some challenges which inhibit the development of 3D steganography algorithms have been identified. This study concludes with some useful findings in the end. A comprehensive survey on 3D image steganography techniques, to the best of the authors’ knowledge, is not available and thus it suffices the need of this study. © The Institution of Engineering and Technology 2017.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 67 条
  • [11] Fridrich J., Steganography in Digital Media, (2010)
  • [12] Cox I., Digital Watermarking and Steganography, (2008)
  • [13] Wang K., Lavoue G., Denis F., Et al., A comprehensive survey on three-dimensional mesh watermarking, IEEE Trans. Multimed., 10, 8, pp. 1513-1527, (2008)
  • [14] Alface P.R., Macq B., From 3D mesh data hiding to 3D shape blind and robust watermarking: A survey, Trans. Data Hiding Multimed. Secur., 4499, pp. 91-115, (2007)
  • [15] Nematollahi M., Vorakulpipat C., Rosales H., Digital Watermarking Techniques and Trends, (2017)
  • [16] Morkel T., Eloff J.H.P., Olivier M.S., An Overview/Image Steganography
  • [17] Xu H., Wang J., Kim H., Near-optimal solution to pair-wise LSB matching via an immune programming strategy, Inf. Sci., 180, 8, pp. 1201-1217, (2010)
  • [18] Fridrich J., Goljan M., Du R., ‘Invertible authentication watermark for JPEG images’, ITCC 2001, pp. 2-4, (2001)
  • [19] Wang C., Cheng Y., An efficient information hiding algorithm for polygon models, Comput. Graph. Forum, 24, 3, pp. 591-600, (2005)
  • [20] Xuan G., Zhu J., Chen J., Et al., Distortionless data hiding based on integer wavelet transform, Electron. Lett., 38, 25, (2002)