Skip to main content
. 2022 Feb 1;22(3):1109. doi: 10.3390/s22031109

Table 1.

The table below summarizes the security models reviewed in the document review process.

Security Model Cryptographic Algorithms Steganography
Technique
Backup and Recovery Data Share References
The private cloud for software as a service (SaaS) AES LSB video technique of steganography No mention of data backups and recovery Deliver services to end users in a pay-as-you-go manner [6]
Image-Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients No clear mention of cryptographic algorithms LSB Image steganography using pseudo-random sequence function with 2D-DCT No mention of data backups and recovery Provide services in a pay-as-you-go manner [1]
The hybrid encryption in Bluetooth innovation and in cloud computing AES, FHE Steganography not applied Maintain data redundancy and security Bluetooth [23]
Data security in cloud computing using Elliptic Curve Cryptography ECC Steganography not applied No mention of backups and recovery Data share not specified [24]
Visually Imperceptible Hybrid Crypto Steganography (VIHCS) model AES, RSA 2D-Discrete Wavelet Transform (2D-DWT-2L) AGA-OPAP with LSB No clear mention of backups and recovery Combined cryptosystems with Steganography for data transmission [25]
RGB shuffling method using combined steganography and cryptography RGB shuffling algorithm and Message Digest 5 (MD5) algorithm LSB image, video, or audio technique of steganography Mention of image recovery in one of the phases No specific mention of data sharing using the model [26]