Skip to main content

Advances, Systems and Applications

Table 1 symbols and their representations in the proposed approaches

From: Distributed data hiding in a single cloud storage environment

Symbol

Representation

s

the secret message formatted in base 2

B

the base used to encode the secret, such that B≥2

(sn−1sn−2s0)B

the representation in base B of the secret

F(i)

the ith folder which contains different types of file, such that 0≤i<n

L(i)

the ith list which contains different types of file, such that 0≤i<n

\(\tilde {F}\)

the stego folder which contains the concealed secret

\(\tilde {F}_{i}\)

the file i in the stego folder

\(F^{(i)}_{j}\)

the jth file in folder number i, such that 0≤i<n and 0≤j<B

\(L^{(i)}_{j}\)

the jth file in list number i, such that 0≤i<n and 0≤j<B,