Review Article

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Table 9

The summary of the steganographic techniques.

Steganographic techniquesReferencesOperations supportedUsabilityPrivacy

Semagrams[123]Storage and retrievalOnly uses images and symbols to cover the dataProvides a low level of privacy
Open code[124]StorageUsed to hide the message from the intruderLow level of privacy as compared to cryptographic techniques
Text steganography[127]Storage and retrievalUsed to change some textual characteristics of the textVery low level of privacy
Image steganography[128]Storage and retrievalUsed to hide sensitive data inside an image fileProvides a medium level of privacy
Audio steganography[129]Storage and retrievalModifying a digitalized audio signalProvides a high level of privacy
Video steganography[130]Storage and retrievalUses both image and audio steganographyDepends on the video resolution. Higher the resolution, greater the privacy
Frequency Domain[131]Only storageHiding a large amount of data with no loss of secret messageProvides a high level of privacy as compared to other steganographic techniques
Spatial Domain[132]Storage and retrievalThe used physical location of pixels in an imageDepends on the image resolution. Higher the resolution, greater the privacy