Skip to main content

Table 1 Summary of PDE systems for desktop computers

From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey

Scheme Method Adversary Deniable level Layer
Scheme 1 (Anderson et al. 1998) Steganography Multi-snapshot Arbitrary File system
Scheme 2 (Anderson et al. 1998) Steganography Single-snapshot Arbitrary File system
StegFS (McDonald and Kuhn 2000) Steganography Single-snapshot Arbitrary File system
StegFS (Pang et al. 2003; 2004) Steganography Multi-snapshot Arbitrary File system
StegHide (Zhou et al. 2004) Steganography Multi-snapshot Arbitrary File system
TrueCrypt (2012) Hidden volume Single-snapshot One Block device
HIVE (Blass et al. 2014) ORAM Multi-snapshot Multiple Block device
DataLair (Chakraborti et al. 2017) ORAM Multi-snapshot Multiple Block device
DetWoORAM (Roche et al. 2017) ORAM Multi-snapshot Multiple Block device
ECD (Zuck et al. 2017) Hidden volume Multi-snapshot One Block device