Table 1.
The table below summarizes the security models reviewed in the document review process.
Security Model | Cryptographic Algorithms | Steganography Technique |
Backup and Recovery | Data Share | References |
---|---|---|---|---|---|
The private cloud for software as a service (SaaS) | AES | LSB video technique of steganography | No mention of data backups and recovery | Deliver services to end users in a pay-as-you-go manner | [6] |
Image-Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients | No clear mention of cryptographic algorithms | LSB Image steganography using pseudo-random sequence function with 2D-DCT | No mention of data backups and recovery | Provide services in a pay-as-you-go manner | [1] |
The hybrid encryption in Bluetooth innovation and in cloud computing | AES, FHE | Steganography not applied | Maintain data redundancy and security | Bluetooth | [23] |
Data security in cloud computing using Elliptic Curve Cryptography | ECC | Steganography not applied | No mention of backups and recovery | Data share not specified | [24] |
Visually Imperceptible Hybrid Crypto Steganography (VIHCS) model | AES, RSA | 2D-Discrete Wavelet Transform (2D-DWT-2L) AGA-OPAP with LSB | No clear mention of backups and recovery | Combined cryptosystems with Steganography for data transmission | [25] |
RGB shuffling method using combined steganography and cryptography | RGB shuffling algorithm and Message Digest 5 (MD5) algorithm | LSB image, video, or audio technique of steganography | Mention of image recovery in one of the phases | No specific mention of data sharing using the model | [26] |