http://iet.metastore.ingenta.com
1887

Comprehensive survey of 3D image steganography techniques

Comprehensive survey of 3D image steganography techniques

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Image Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study presents an overview of various three-dimensional (3D) image steganography techniques from survey point of view. The authors present taxonomy of 3D image steganography techniques and identify the recent advances in this field. Steganalysis and attacks on 3D image steganography algorithms have also been studied. 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks. Some challenges which inhibit the development of 3D steganography algorithms have been identified. This study concludes with some useful findings in the end. A comprehensive survey on 3D image steganography techniques, to the best of the authors’ knowledge, is not available and thus it suffices the need of this study.

References

    1. 1)
      • A. Stanley .
        1. Stanley, A.: ‘Pairs of values and the chi-squared attack’. Master's thesis, Department of Mathematics, Owa State University, 2005.
        .
    2. 2)
      • A. Cheddad , J. Condell , K. Curran .
        2. Cheddad, A., Condell, J., Curran, K., et al: ‘Digital image steganography: survey and analysis of current methods’, Signal Process., 2010, 90, (3), pp. 727752.
        . Signal Process. , 3 , 727 - 752
    3. 3)
      • M.S. Subhedar , V.H. Mankar .
        3. Subhedar, M.S., Mankar, V.H.: ‘Current status and key issues in image steganography: a survey’, Comput. Sci. Rev., 2014, 13–14, pp. 95113.
        . Comput. Sci. Rev. , 95 - 113
    4. 4)
      • N.F. Johnson , S. Jajodia .
        4. Johnson, N.F., Jajodia, S.: ‘Exploring steganography: seeing the unseen’, Computer, 1998, 31, (2), pp. 2634.
        . Computer , 2 , 26 - 34
    5. 5)
      • 5. Daily Telegraph: ‘Terror plot horror hidden in porn film’, Adelaide now, 2012. Available at http://www.adelaidenow.com.au/news/world/terror-plot-horror-hidden-in-porn-film/news-story/49886a10ddeccdfb341cf72c48bbf5d5, accessed 1 August 2016.
        .
    6. 6)
      • G. Kolata .
        6. Kolata, G.: ‘Veiled messages of terror may lurk in cyberspace’, in Science, The New York Times, 2001. Available at http://www.nytimes.com/2001/10/30/science/veiled-messages-of-terror-may-lurk-in-cyberspace.html, accessed 19 November 2016.
        .
    7. 7)
      • 7. Wired and D. McCullagh, ‘Bin Laden: Steganography master?’ WIRED. Available at http://archive.wired.com/politics/law/news/2001/02/41658?currentPage=all, accessed1 June 2016.
        .
    8. 8)
      • Y. Shi , X. Li , X. Zhang .
        8. Shi, Y., Li, X., Zhang, X., et al: ‘Reversible data hiding: advances in the past two decades’, IEEE Access, 2016, 4, pp. 32103237.
        . IEEE Access , 3210 - 3237
    9. 9)
      • N. Johnson , Z. Duric , S. Jajodia . (2000)
        9. Johnson, N., Duric, Z., Jajodia, S.: ‘Information hiding: steganography and watermarking attacks and countermeasures’ (Kluwer Academic Publishers, Boston, 2000).
        .
    10. 10)
      • P. Wayner . (2009)
        10. Wayner, P.: ‘Disappearing cryptography’ (Elsevier, Amsterdam, 2009, 1st edn).
        .
    11. 11)
      • J. Fridrich . (2010)
        11. Fridrich, J.: ‘Steganography in digital media’ (Cambridge University Press, Cambridge, 2010, 1st edn).
        .
    12. 12)
      • I. Cox . (2008)
        12. Cox, I.: ‘Digital watermarking and steganography’ (Morgan Kaufmann Publishers, Amsterdam, 2008, 1st edn).
        .
    13. 13)
      • K. Wang , G. Lavoué , F. Denis .
        13. Wang, K., Lavoué, G., Denis, F., et al: ‘A comprehensive survey on three-dimensional mesh watermarking’, IEEE Trans. Multimed., 2008, 10, (8), pp. 15131527.
        . IEEE Trans. Multimed. , 8 , 1513 - 1527
    14. 14)
      • P.R. Alface , B. Macq .
        14. Alface, P.R., Macq, B.: ‘From 3D mesh data hiding to 3D shape blind and robust watermarking: a survey’, Trans. Data Hiding Multimed. Secur., 2007, 4499, pp. 91115.
        . Trans. Data Hiding Multimed. Secur. , 91 - 115
    15. 15)
      • M. Nematollahi , C. Vorakulpipat , H. Rosales . (2017)
        15. Nematollahi, M., Vorakulpipat, C., Rosales, H.: ‘Digital watermarking techniques and trends’ (Springer Topics in Signal Processing, 2017, 1st edn).
        .
    16. 16)
      • T. Morkel , J.H.P. Eloff , M.S. Olivier .
        16. Morkel, T., Eloff, J.H.P., Olivier, M.S.: ‘An overview/image steganography’. Available at http://mo.co.za/open/stegoverview.pdf, accessed August 2016.
        .
    17. 17)
      • H. Xu , J. Wang , H. Kim .
        17. Xu, H., Wang, J., Kim, H.: ‘Near-optimal solution to pair-wise LSB matching via an immune programming strategy’, Inf. Sci., 2010, 180, (8), pp. 12011217.
        . Inf. Sci. , 8 , 1201 - 1217
    18. 18)
      • J. Fridrich , M. Goljan , R. Du .
        18. Fridrich, J., Goljan, M., Du, R.: ‘Invertible authentication watermark for JPEG images’. ITCC 2001, Las Vegas, Nevada, April 2001, pp. 24.
        . ITCC 2001 , 2 - 4
    19. 19)
      • C. Wang , Y. Cheng .
        19. Wang, C., Cheng, Y.: ‘An efficient information hiding algorithm for polygon models’, Comput. Graph. Forum, 2005, 24, (3), pp. 591600.
        . Comput. Graph. Forum , 3 , 591 - 600
    20. 20)
      • G. Xuan , J. Zhu , J. Chen .
        20. Xuan, G., Zhu, J., Chen, J., et al: ‘Distortionless data hiding based on integer wavelet transform’, Electron. Lett., 2002, 38, (25), p. 1646.
        . Electron. Lett. , 25 , 1646
    21. 21)
      • Y. Cheng , C. Wang .
        21. Cheng, Y., Wang, C.: ‘A high-capacity steganographic approach for 3D polygonal meshes’, Vis. Comput., 2006, 22, (9–11), pp. 845855.
        . Vis. Comput. , 845 - 855
    22. 22)
      • M.U. Celik , G. Sharma , A.M. Tekalp .
        22. Celik, M.U., Sharma, G., Tekalp, A.M., et al: ‘Reversible data hiding’. Proc. Int. Conf. Image Processing, September 2002, vol. II, pp. 157160.
        . Proc. Int. Conf. Image Processing , 157 - 160
    23. 23)
      • Y. Cheng , C. Wang .
        23. Cheng, Y., Wang, C.: ‘An adaptive steganographic algorithm for 3D polygonal meshes’, Vis. Comput., 2007, 23, (9–11), pp. 721732.
        . Vis. Comput. , 721 - 732
    24. 24)
      • X. Li , J. Wang .
        24. Li, X., Wang, J.: ‘A steganographic method based upon JPEG and particle swarm optimization algorithm’, Inf. Sci., 2007, 177, (15), pp. 30993109.
        . Inf. Sci. , 15 , 3099 - 3109
    25. 25)
      • M.-W Chao , C.-h Lin , Yu .
        25. Chao, M.-W, Lin, C.-h, Yu, , et al: ‘A high capacity 3D steganography algorithm’, IEEE Trans. Vis. Comput. Graph., 2009, 15, (2), pp. 274284.
        . IEEE Trans. Vis. Comput. Graph. , 2 , 274 - 284
    26. 26)
      • S. Sun .
        26. Sun, S.: ‘A novel edge based image steganography with 2 k correction and Huffman encoding’, Inf. Process. Lett., 2016, 116, (2), pp. 9399.
        . Inf. Process. Lett. , 2 , 93 - 99
    27. 27)
      • Y. Huang , Y. Tsai .
        27. Huang, Y., Tsai, Y.: ‘A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity’, 3D Res., 2015, 6, (2).
        . 3D Res. , 2
    28. 28)
      • R. Ohbuchi , A. Mukaiyama , S. Takahashi .
        28. Ohbuchi, R., Mukaiyama, A., Takahashi, S.: ‘A frequency-domain approach to watermarking 3D shapes’, Comput. Graph. Forum, 2002, 21, (3), pp. 373382.
        . Comput. Graph. Forum , 3 , 373 - 382
    29. 29)
      • H. Chuang , C.W. Cheng , Z.Y. Yen .
        29. Chuang, H., Cheng, C.W., Yen, Z.Y.: ‘Reversible data hiding with affine invariance for 3D models’. Proc. of IET Int. Conf. on Frontier Computing. Theory, Technologies and Applications, 2010, pp. 7781.
        . Proc. of IET Int. Conf. on Frontier Computing. Theory, Technologies and Applications , 77 - 81
    30. 30)
      • Y. Yang .
        30. Yang, Y.: ‘Information analysis for steganography and steganalysis in 3D polygonal meshes’, Durham University, 2013.
        .
    31. 31)
      • R. Ohbuchi , H. Masuda , M. Aono .
        31. Ohbuchi, R., Masuda, H., Aono, M.: ‘Watermarking three-dimensional polygonal models through geometric and topological modifications’, IEEE J. Sel. Areas Commun., 1998, 16, (4), pp. 551560.
        . IEEE J. Sel. Areas Commun. , 4 , 551 - 560
    32. 32)
      • R. Ohbuchi , H. Masuda , M. Aono .
        32. Ohbuchi, R., Masuda, H., Aono, M.: ‘Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models’, Comput. Commun., 1998, 21, (15), pp. 13441354.
        . Comput. Commun. , 15 , 1344 - 1354
    33. 33)
      • F. Cayre , B. Macq .
        33. Cayre, F., Macq, B.: ‘Data hiding on 3-D triangle meshes’, IEEE Trans. Signal Process., 2003, 51, (4), pp. 939949.
        . IEEE Trans. Signal Process. , 4 , 939 - 949
    34. 34)
      • Y. Maret , T. Ebrahimi .
        34. Maret, Y., Ebrahimi, T.: ‘Data hiding on 3D polygonal meshes’. Multimedia and Security Workshop Proc., 2004, pp. 6874.
        . Multimedia and Security Workshop Proc. , 68 - 74
    35. 35)
      • N. Aspert , D. Santa-Cruz , T. Ebrahimi .
        35. Aspert, N., Santa-Cruz, D., Ebrahimi, T.: ‘MESH: Measuring error between surfaces using the Hausdorff distance’. Proc. of the IEEE Int. Conf. on Multimedia and Expo (ICME), 2002, pp. 705708.
        . Proc. of the IEEE Int. Conf. on Multimedia and Expo (ICME) , 705 - 708
    36. 36)
      • F. Cayre , O. Devillers , F. Schmitt .
        36. Cayre, F., Devillers, O., Schmitt, F., et al: ‘Watermarking 3D triangle meshes for authentication and integrity’, Research Report-5223, 2004.
        .
    37. 37)
      • H. Wu , J. Dugelay .
        37. Wu, H., Dugelay, J.: ‘Steganography in 3D geometries and images by adjacent bin mapping’, EURASIP J. Inf. Secur., 2009, 2009, pp. 110.
        . EURASIP J. Inf. Secur. , 1 - 10
    38. 38)
      • H. Wu , J. Dugelay , Y. Cheung .
        38. Wu, H., Dugelay, J., Cheung, Y.: ‘A data mapping method for steganography and its application to images’. Proc. of the 10th Information Hiding Workshop, 2008 (LNCS, 5284), pp. 236250.
        . Proc. of the 10th Information Hiding Workshop , 236 - 250
    39. 39)
      • W. Su , Z. Ni , Y.Q. Shi .
        39. Su, W., Ni, Z., Shi, Y.Q., et al: ‘Reversible data hiding’, IEEE Trans. Circuits Syst. Video Technol., 2006, 16, (3), pp. 354362.
        . IEEE Trans. Circuits Syst. Video Technol. , 3 , 354 - 362
    40. 40)
      • P. Thiyagarajan , V. Natarajan , G. Aghila .
        40. Thiyagarajan, P., Natarajan, V., Aghila, G., et al: ‘Pattern based 3D image steganography’, 3D Res., 2013, 4, (1), pp. 18.
        . 3D Res. , 1 , 1 - 8
    41. 41)
      • K. Anish , N. Arpita , H. Nikhil .
        41. Anish, K., Arpita, N., Nikhil, H., et al: ‘Intelligence system security based on 3-D image’, Adv. Intell. Syst. Comput., 2017, 515, pp. 159167.
        . Adv. Intell. Syst. Comput. , 159 - 167
    42. 42)
      • 42. ‘Computer graphics at Stanford University’. Available at http://graphics.stanford.edu/data/3Dscanrep/, accessed19 December 2016.
        .
    43. 43)
      • X. Mao , M. Shiba , A. Imamiya .
        43. Mao, X., Shiba, M., Imamiya, A.: ‘Watermarking 3-D geometric models through triangle subdivision’. Proc. SPIE, 2001, vol4314, pp. 253260.
        . Proc. SPIE , 253 - 260
    44. 44)
      • P. Amat , W. Puech , S. Druon .
        44. Amat, P., Puech, W., Druon, S., et al: ‘Lossless 3D steganography based on MST and connectivity modification’, Signal Process., Image Commun., 2010, 25, pp. 400412.
        . Signal Process., Image Commun. , 400 - 412
    45. 45)
      • Y. Tsai .
        45. Tsai, Y.: ‘An adaptive steganographic algorithm for 3D polygonal models using vertex decimation’, Multimedia Tools Appl., 2012, 69, (3), pp. 859876.
        . Multimedia Tools Appl. , 3 , 859 - 876
    46. 46)
      • W. Schroeder , J. Zarge , W. Lorensen .
        46. Schroeder, W., Zarge, J., Lorensen, W.: ‘Decimation of triangle meshes’, ACM SIGGRAPH Comput. Graph., 1992, 26, (2), pp. 6570.
        . ACM SIGGRAPH Comput. Graph. , 2 , 65 - 70
    47. 47)
      • Y. Tsai .
        47. Tsai, Y.: ‘A distortion-Free data hiding scheme for triangular meshes based on recursive subdivision’, Adv. Multimed., 2016, 2016, pp. 110.
        . Adv. Multimed. , 1 - 10
    48. 48)
      • M Held , E.M. Arkin , J.S.B. Mitchell .
        48. Held, M, Arkin, E.M., Mitchell, J.S.B., et al: ‘Hamiltonian triangulations for fast rendering’, Vis. Comput., 1996, 12, (9), pp. 429444.
        . Vis. Comput. , 9 , 429 - 444
    49. 49)
      • M. Chow .
        49. Chow, M.: ‘Optimized geometry compression for real-time rendering’. Proc. IEEE Visualization, 1997, pp. 347354.
        . Proc. IEEE Visualization , 347 - 354
    50. 50)
      • A. Bogomjakov , C. Gostman , M. Isenburg .
        50. Bogomjakov, A., Gostman, C., Isenburg, M.: ‘Distortion-free steganography for polygonal meshes’, Comput. Graph. Forum, 2008, 27, (2), pp. 637642.
        . Comput. Graph. Forum , 2 , 637 - 642
    51. 51)
      • M. Luo .
        51. Luo, M.: ‘Robust and blind 3D watermarking’. PhD dissertation, Department of Computer Science, University of York, York, UK, 2006.
        .
    52. 52)
      • Y. Yang , R. Pintus , H. Rushmeier .
        52. Yang, Y., Pintus, R., Rushmeier, H., et al: ‘A 3D steganalytic algorithm and steganalysis-resistant watermarking’, IEEE Trans. Vis. Comput. Graph., 2017, 23, (2), pp. 10021013.
        . IEEE Trans. Vis. Comput. Graph. , 2 , 1002 - 1013
    53. 53)
      • J. Fridrich , M. Goljan .
        53. Fridrich, J., Goljan, M.: ‘Practical steganalysis – state of the art’. Proc. SPIE Photonics Imaging 2002 Security and Watermarking of Multimedia Contents, 2002, vol4675, pp. 113.
        . Proc. SPIE Photonics Imaging 2002 Security and Watermarking of Multimedia Contents , 1 - 13
    54. 54)
      • Y. Yang , I. Ivrissimtzis .
        54. Yang, Y., Ivrissimtzis, I.: ‘Mesh discriminative features for 3D steganalysis’, ACM Trans. Multimed. Comput. Commun. Appl., 2014, 10, (3), pp. 113.
        . ACM Trans. Multimed. Comput. Commun. Appl. , 3 , 1 - 13
    55. 55)
      • J. Fridrich , M. Goljan , D. Hogea .
        55. Fridrich, J., Goljan, M., Hogea, D.: ‘Steganalysis of JPEG images: breaking the F5 algorithm’. Proc. Int. Workshop Information Hiding, 2002, pp. 310323.
        . Proc. Int. Workshop Information Hiding , 310 - 323
    56. 56)
      • Y. Yang , N. Peyerimhoff , I. Ivrissimtzis .
        56. Yang, Y., Peyerimhoff, N., Ivrissimtzis, I.: ‘Linear correlations between spatial and normal noise in triangle meshes’, IEEE Trans. Vis. Comput. Graph., 2013, 19, (1), pp. 4555.
        . IEEE Trans. Vis. Comput. Graph. , 1 , 45 - 55
    57. 57)
      • Y. Yang , R. Pintus , H. Rushmeier .
        57. Yang, Y., Pintus, R., Rushmeier, H., et al: ‘A steganalytic algorithm for 3D polygonal meshes’. Proc. IEEE Int. Conf. Image Processing, October 2014, pp. 47824786.
        . Proc. IEEE Int. Conf. Image Processing , 4782 - 4786
    58. 58)
      • J. Cho , R. Prost , H. Jung .
        58. Cho, J., Prost, R., Jung, H.: ‘An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms’, IEEE Trans. Signal Process., 2007, 55, (1), pp. 142155.
        . IEEE Trans. Signal Process. , 1 , 142 - 155
    59. 59)
      • J. Kodovsky , J. Fridrich , V. Holub .
        59. Kodovsky, J., Fridrich, J., Holub, V.: ‘Ensemble classifiers for steganalysis of digital media’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (2), pp. 432444.
        . IEEE Trans. Inf. Forensics Sec. , 2 , 432 - 444
    60. 60)
      • Z. Li , A.G. Bors .
        60. Li, Z., Bors, A.G.: ‘3D mesh steganalysis using local shape features’. Proc. of IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), 2016, pp. 21442148.
        . Proc. of IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP) , 2144 - 2148
    61. 61)
      • Z. Li , A. Bors .
        61. Li, Z., Bors, A.: ‘Selection of robust features for the cover source mismatch problem in 3D steganalysis’. Int. Conf. on Pattern Recognition (ICPR), Cancun, Mexico, 2016, pp. 42564261.
        . Int. Conf. on Pattern Recognition (ICPR) , 4256 - 4261
    62. 62)
      • (2010)
        62. ‘Special Agent Ricci against alleged Russian agents’, 2010. Available at https://www.justice.gov/sites/default/files/opa/legacy/2010/06/28/062810complaint2.pdf, accessed 10 July 2017.
        .
    63. 63)
      • (2017)
        63. ‘3D human lung model to shed light on respiratory diseases’, www.financialexpress.com, 2017. Available at http://www.financialexpress.com/lifestyle/science/3d-human-lung-model-to-shed-light-on-respiratory-diseases/667123/, accessed 10 July 2017.
        .
    64. 64)
      • (2017)
        64. ‘10 Types of 3D Graphics Software Worth Knowing | Animation Career Review’, animationcareerreview.com, 2017. Available at http://www.animationcareer-review.com/articles/10-types-3d-graphics-software-worth-knowing, accessed 10 July 2017].
        .
    65. 65)
      • E. Praun , H. Hoppe , A. Finkelstein .
        65. Praun, E., Hoppe, H., Finkelstein, A.: ‘Robust mesh watermarking’. SIGGRAPH ‘99 Proc., 1999, pp. 6976.
        . SIGGRAPH ‘99 Proc. , 69 - 76
    66. 66)
      • I. Cox , J. Kilian , F. Leighton .
        66. Cox, I., Kilian, J., Leighton, F., et al: ‘Secure spread spectrum watermarking for multimedia’, IEEE Trans. Image Process., 1997, 6, (12), pp. 16731687.
        . IEEE Trans. Image Process. , 12 , 1673 - 1687
    67. 67)
      • 67. E. S. W. complex and Weisstein, ‘Polygon mesh’, in Wikipedia. Available at https://en.wikipedia.org/wiki/Polygon_mesh#/media/File:Mesh_overview.svg, accessed17 October 2016.
        .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2017.0162
Loading

Related content

content/journals/10.1049/iet-ipr.2017.0162
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address