Skip to main content

Advances, Systems and Applications

Table 1 Steganographic techniques comparaison based on the covert media type and covert media modification

From: Distributed data hiding in multi-cloud storage environment

Classical Steganography

References

Text

Image

Audio

Video

Covert Media Modification

Liu et al. [51]

Lee et al. [19]

Ekodeck et al. [4]

Khosravi et al. [17]

×

×

×

Sahu et al. [5]

Su et al. [52]

×

×

×

Jiang et al. [6]

Ali et al. [53]

×

×

×

Pilania et al. [7]

Baziyad et al. [54]

×

×

×

Distributed Steganography

References

Text

Image

Audio

Video

Covert Media Modification

Gutub et al. [45]

Gutub et al. [46]

×

×

×

Yang et al. [14]

Liao et al. [34]

Gutub et al. [47]

Gutub et al. [48]

×

×

×

Our proposal

×