Fig. 2From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a surveyThe hidden volumes techniqueBack to article page