z-logo
open-access-imgOpen Access
Comprehensive survey of 3D image steganography techniques
Author(s) -
Girdhar Ashish,
Kumar Vijay
Publication year - 2018
Publication title -
iet image processing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.401
H-Index - 45
eISSN - 1751-9667
pISSN - 1751-9659
DOI - 10.1049/iet-ipr.2017.0162
Subject(s) - steganography , steganalysis , computer science , steganography tools , embedding , image (mathematics) , representation (politics) , artificial intelligence , taxonomy (biology) , field (mathematics) , data mining , pattern recognition (psychology) , computer vision , theoretical computer science , mathematics , botany , politics , political science , pure mathematics , law , biology
This study presents an overview of various three‐dimensional (3D) image steganography techniques from survey point of view. The authors present taxonomy of 3D image steganography techniques and identify the recent advances in this field. Steganalysis and attacks on 3D image steganography algorithms have also been studied. 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks. Some challenges which inhibit the development of 3D steganography algorithms have been identified. This study concludes with some useful findings in the end. A comprehensive survey on 3D image steganography techniques, to the best of the authors’ knowledge, is not available and thus it suffices the need of this study.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here