A Review of Various Steganography Techniques in Cloud Computing
DOI:
https://doi.org/10.32792/utq/utjsci/v7i1.261Keywords:
Cloud Computing, Steganography, Data security, CryptographyAbstract
One of the latest trends in IT sector is cloud computing. It develops the capabilities of organizations dynamically without training new employees, obtaining new software licenses or investing in infrastructure. At present, user keeps and share a high amount of data on cloud, and hence, the security of cloud computing is necessary so that there is no threat to any of the user’s data. Steganography is becoming a standard practice for both cloud users and cloud service providers as a mechanism against unauthorized surveillance. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. The aim of this paper is to provide an overview of steganography in cloud computing and compare various studies on the basis of technique selection, carrier formats, payload capacity and embedding algorithm to open important research directions.Downloads
Published
2019-06-20
Issue
Section
Articles
License
Copyright (c) 2019 University of Thi-Qar Journal of Science
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
A Review of Various Steganography Techniques in Cloud Computing. (2019). University of Thi-Qar Journal of Science, 7(1), 113-119. https://doi.org/10.32792/utq/utjsci/v7i1.261