Review Article
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
Table 9
The summary of the steganographic techniques.
| Steganographic techniques | References | Operations supported | Usability | Privacy |
| Semagrams | [123] | Storage and retrieval | Only uses images and symbols to cover the data | Provides a low level of privacy | Open code | [124] | Storage | Used to hide the message from the intruder | Low level of privacy as compared to cryptographic techniques | Text steganography | [127] | Storage and retrieval | Used to change some textual characteristics of the text | Very low level of privacy | Image steganography | [128] | Storage and retrieval | Used to hide sensitive data inside an image file | Provides a medium level of privacy | Audio steganography | [129] | Storage and retrieval | Modifying a digitalized audio signal | Provides a high level of privacy | Video steganography | [130] | Storage and retrieval | Uses both image and audio steganography | Depends on the video resolution. Higher the resolution, greater the privacy | Frequency Domain | [131] | Only storage | Hiding a large amount of data with no loss of secret message | Provides a high level of privacy as compared to other steganographic techniques | Spatial Domain | [132] | Storage and retrieval | The used physical location of pixels in an image | Depends on the image resolution. Higher the resolution, greater the privacy |
|
|