Comprehensive survey of 3D image steganography techniques

被引:0
作者
Girdhar A. [1 ]
Kumar V. [1 ]
机构
[1] Computer Science and Engineering Department, Thapar University, Punjab, Patiala
关键词
Steganography;
D O I
10.1049/IET-IPR.2017.0162
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents an overview of various three-dimensional (3D) image steganography techniques from survey point of view. The authors present taxonomy of 3D image steganography techniques and identify the recent advances in this field. Steganalysis and attacks on 3D image steganography algorithms have also been studied. 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks. Some challenges which inhibit the development of 3D steganography algorithms have been identified. This study concludes with some useful findings in the end. A comprehensive survey on 3D image steganography techniques, to the best of the authors’ knowledge, is not available and thus it suffices the need of this study. © The Institution of Engineering and Technology 2017.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 67 条
  • [31] Ohbuchi R., Masuda H., Aono M., Watermarking three-dimensional polygonal models through geometric and topological modifications, IEEE J. Sel. Areas Commun., 16, 4, pp. 551-560, (1998)
  • [32] Ohbuchi R., Masuda H., Aono M., Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models, Comput. Commun., 21, 15, pp. 1344-1354, (1998)
  • [33] Cayre F., Macq B., Data hiding on 3-D triangle meshes, IEEE Trans. Signal Process., 51, 4, pp. 939-949, (2003)
  • [34] Maret Y., Ebrahimi T., ‘Data hiding on 3D polygonal meshes’, Multimedia and Security Workshop Proc, pp. 68-74, (2004)
  • [35] Aspert N., Santa-Cruz D., Ebrahimi T., MESH: Measuring error between surfaces using the Hausdorff distance, Proc. of the IEEE Int. Conf. on Multimedia and Expo (ICME), pp. 705-708, (2002)
  • [36] Cayre F., Devillers O., Schmitt F., Et al., Watermarking 3D triangle meshes for authentication and integrity, Research Report, 5223, (2004)
  • [37] Wu H., Dugelay J., Steganography in 3D geometries and images by adjacent bin mapping, EURASIP J. Inf. Secur., 2009, pp. 1-10, (2009)
  • [38] Wu H., Dugelay J., Cheung Y., ‘A data mapping method for steganography and its application to images’, Proc. of the 10Th Information Hiding Workshop, 2008 (LNCS, 5284), pp. 236-250
  • [39] Su W., Ni Z., Shi Y.Q., Et al., Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., 16, 3, pp. 354-362, (2006)
  • [40] Thiyagarajan P., Natarajan V., Aghila G., Et al., Pattern based 3D image steganography, 3D Res., 4, 1, pp. 1-8, (2013)