Advances, Systems and Applications
From: Distributed data hiding in multi-cloud storage environment
Classical Steganography | |||||
---|---|---|---|---|---|
References | Text | Image | Audio | Video | Covert Media Modification |
Liu et al. [51] Lee et al. [19] Ekodeck et al. [4] Khosravi et al. [17] | ✓ | × | × | × | ✓ |
Sahu et al. [5] Su et al. [52] | × | ✓ | × | × | ✓ |
Jiang et al. [6] Ali et al. [53] | × | × | ✓ | × | ✓ |
Pilania et al. [7] Baziyad et al. [54] | × | × | × | ✓ | ✓ |
Distributed Steganography | |||||
References | Text | Image | Audio | Video | Covert Media Modification |
Gutub et al. [45] Gutub et al. [46] | ✓ | × | × | × | ✓ |
Yang et al. [14] Liao et al. [34] Gutub et al. [47] Gutub et al. [48] | × | ✓ | × | × | ✓ |
Our proposal | ✓ | ✓ | ✓ | ✓ | × |