2019 International Conference on Innovative Trends in Computer Engineering (ITCE) 2019
DOI: 10.1109/itce.2019.8646434
|View full text |Cite
|
Sign up to set email alerts
|

Data Security in Cloud Computing Using Steganography: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(24 citation statements)
references
References 14 publications
0
21
0
Order By: Relevance
“…For the maintenance of images, cloud storage is an example [40], [41]. Cloud servers also have been introduced to image watermarking application [42]. By the cloud server a unique watermark is inserted in to the encrypted images before images are sent to user [43].…”
Section: Secure Data On Cloudmentioning
confidence: 99%
“…For the maintenance of images, cloud storage is an example [40], [41]. Cloud servers also have been introduced to image watermarking application [42]. By the cloud server a unique watermark is inserted in to the encrypted images before images are sent to user [43].…”
Section: Secure Data On Cloudmentioning
confidence: 99%
“…• File storage as a service (FSaaS): The cloud provides the ability to store, manage and access the data from an interface of browser. the cloud provider holds the maintenance responsibility and oversees the infrastructure storage [7].…”
Section: A Service Model Of Cloud Computingmentioning
confidence: 99%
“…• Invisibility (Quality): The changes in the cover object undetectable by the Human Visual System (HVS) [7].…”
Section: B Objectives Of Steganographymentioning
confidence: 99%
See 2 more Smart Citations