An Analysis of 3D Steganography Techniques

Steganography has become a preferred technique these days to successfully hide secret messages. Various research has been done in the past to justify and analyze suitable types of cover file, such as images, audio, videos, etc. Advancement in the image-processing domain has opened various possibilities of using three-dimensional (3D) images as cover files. In this paper, a systematic study of the research work done on 3D steganography in the last fifteen years has been carried out. The study is divided into different sections based on the types of algorithms used, additional security features, evaluation parameters, etc. Moreover, certain steganalysis techniques that are applicable for 3D steganography are also discussed.

[1]  Roshidi Din,et al.  Analysis review on spatial and transform domain technique in digital steganography , 2020, Bulletin of Electrical Engineering and Informatics.

[2]  Mohsen Moradi,et al.  Combining and Steganography of 3D Face Textures , 2017, ArXiv.

[3]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[4]  Juan Lin,et al.  3D Multilayered Turtle Shell Models for Image Steganography , 2020 .

[5]  Rafiqul Islam,et al.  An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures , 2016, Inf. Secur. J. A Glob. Perspect..

[6]  William Puech,et al.  Lossless 3D steganography based on MST and connectivity modification , 2010, Signal Process. Image Commun..

[7]  Chin-Chen Chang,et al.  An Image Steganography Scheme Using 3D-Sudoku , 2016, J. Inf. Hiding Multim. Signal Process..

[8]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[9]  Akram M. Zeki,et al.  A Genetic-Algorithm-Based Approach for Audio Steganography , 2009 .

[10]  M. Dupac,et al.  3D Steganography Models , 2008 .

[11]  Peyman Ayubi,et al.  High secure digital image steganography based on 3D chaotic map , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[12]  Nannan Li,et al.  A High-Capacity 3D Steganography Algorithm With Adjustable Distortion , 2017, IEEE Access.

[13]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[14]  Adrian G. Bors,et al.  Steganalysis of 3D objects using statistics of local feature sets , 2017, Inf. Sci..

[15]  Yuan-Yu Tsai An adaptive steganographic algorithm for 3D polygonal models using vertex decimation , 2012, Multimedia Tools and Applications.

[16]  Urmila Pilania,et al.  A Proposed Optimized Steganography Technique using ROI, IWT and SVD , 2019 .

[17]  Mazdak Zamani,et al.  An overview on audio steganography techniques , 2012 .

[18]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[19]  Wassim Alexan,et al.  AES-Secured Bit-Cycling Steganography in Sliced 3D Images , 2020, 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE).

[20]  Jean-Luc Dugelay,et al.  Steganography in 3D Geometries and Images by Adjacent Bin Mapping , 2009, EURASIP J. Inf. Secur..

[21]  R. Ramesh,et al.  Critical review of image steganalysis techniques , 2015, Int. J. Adv. Intell. Paradigms.

[22]  Mazdak Zamani,et al.  Determining the threshold of pixel correlativity analysis , 2013 .

[23]  Peyman Ayubi,et al.  An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..

[24]  Akram M. Zeki,et al.  An artificial-intelligence-based approach for audio steganography , 2009 .

[25]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[26]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[27]  Adrian G. Bors,et al.  3D mesh steganalysis using local shape features , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[28]  Wen-Hsing Hsu,et al.  A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation , 2010, IEEE Transactions on Information Forensics and Security.

[29]  Mazdak Zamani,et al.  VW16E: A Robust Video Watermarking Technique Using Simulated Blocks , 2017 .

[30]  Subariah Ibrahim,et al.  A New Method for Audio Steganography Using Message Integrity , 2013 .

[31]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[32]  Mengtian Cui,et al.  Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things , 2020, IEEE Access.

[33]  Vijay Kumar,et al.  Comprehensive survey of 3D image steganography techniques , 2018, IET Image Process..

[34]  Hossein Rouhani Zeidanloo,et al.  A Novel Approach for Genetic Audio Watermarking , 2010 .

[35]  Hossein Rouhani Zeidanloo,et al.  Genetic Audio Watermarking , 2010, BAIP.

[36]  William Puech,et al.  3D Data Hiding for Enhancement and Indexation on Multimedia Medical Data , 2018, MIAD.

[37]  Manisha Rana,et al.  Genetic Algorithm in Audio Steganography , 2014, ArXiv.

[38]  V. Prasanna Venkatesan,et al.  Pattern based 3D image Steganography , 2013 .

[39]  Nasir D. Memon,et al.  Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.

[40]  George Papadourakis,et al.  A review of image steganalysis techniques for digital forensics , 2018, J. Inf. Secur. Appl..

[41]  Jau-Ji Shen,et al.  Data Hiding Method Based on 3D Magic Cube , 2020, IEEE Access.

[42]  Ying Yang,et al.  Mesh Discriminative Features for 3D Steganalysis , 2014, TOMCCAP.

[43]  Wassim Alexan,et al.  A High Capacity Geometrical Domain Based 3D Image Steganography Scheme , 2019, 2019 International Conference on Advanced Communication Technologies and Networking (CommNet).

[44]  Sherif M. Badr,et al.  A Review on Steganalysis Techniques: From Image Format Point of View , 2014 .

[45]  Ying Yang,et al.  A 3D Steganalytic Algorithm and Steganalysis-Resistant Watermarking , 2017, IEEE Transactions on Visualization and Computer Graphics.

[46]  Adrian G. Bors,et al.  3D Steganalysis Using the Extended Local Feature Set , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[47]  Akram M. Zeki,et al.  PSW statistical LSB image steganalysis , 2016, Multimedia Tools and Applications.

[48]  Mazdak Zamani,et al.  Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques , 2010 .

[49]  Wassim Alexan,et al.  A Comparative Study Among Different Mathematical Sequences in 3D Image Steganography , 2020 .

[50]  Akram M. Zeki,et al.  A robust watermark embedding in smooth areas , 2011 .

[51]  Wassim Alexan,et al.  Secure Message Embedding in 3D Images , 2019, 2019 International Conference on Innovative Trends in Computer Engineering (ITCE).

[52]  Anjum Ara,et al.  A Hybrid Approach Based 3d Image Steganography Instead of 2d Image for Exchange Information , 2018, 2018 3rd International Conference on Communication and Electronics Systems (ICCES).

[53]  Chao-Hung Lin,et al.  A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.

[54]  P SarigaN,et al.  Steganographic data hiding in automatic converted 3D image from 2D and 2D to 3D video conversion , 2015 .

[55]  Mazdak Zamani,et al.  Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.

[56]  Siti Zaiton Mohd Hashim,et al.  A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.

[57]  Chung-Ming Wang,et al.  A NOVEL HIGH CAPACITY 3D STEGANOGRAPHIC ALGORITHM , 2011 .

[58]  Mazdak Zamani,et al.  Correlation between PSNR and bit per sample rate in audio steganography , 2012 .

[59]  Subhendu Kumar Pani,et al.  SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT , 2021, IEEE Access.

[60]  Kejiang Chen,et al.  Distortion Design for Secure Adaptive 3-D Mesh Steganography , 2019, IEEE Transactions on Multimedia.

[61]  Kumud Sachdeva,et al.  Review of Various Steganalysis Techniques , 2018 .

[62]  Pachiyappan Arulmozhivarman,et al.  High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.

[63]  Touradj Ebrahimi,et al.  Steganography for Three-Dimensional Polygonal Meshes , 2002, SPIE Optics + Photonics.

[64]  Hossein Rouhani Zeidanloo,et al.  Genetic substitution-based audio steganography for high capacity applications , 2011 .

[65]  Wassim Alexan,et al.  Secure 3D data hiding technique based on a mesh traversal algorithm , 2020, Multimedia Tools and Applications.

[66]  Mazdak Zamani,et al.  A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains , 2015 .