A Comprehensive Review of Steganography Based Data Security System
Автор: R. Anusha Padmavathi, K.S. Dhanalakshmi, K. Kalai Selvi
Журнал: International Journal of Wireless and Microwave Technologies @ijwmt
Статья в выпуске: 2 Vol.16, 2026 года.
Бесплатный доступ
The recent information and technology developments have impacted data utilization and showed the importance of storing different data types for various purposes. The huge amount of data exchanged between systems through the web, networks, and data storage systems are prone to third-party attacks and demands an effective data security system irrespective of the application. Researchers and developers have secured data using different steganography and cryptography techniques. Steganography uses different mediums to hide sensitive data such as images, videos, text, and audio. This review study discussed the importance of recent trends in steganography and cryptography systems in data security. Various methods and techniques of steganography and their hybrid systems, along with cryptography, have produced efficient results for data security. These methods and techniques are thoroughly reviewed to understand the development of a secure system based on steganography. The image-based steganography systems are widely used in several studies rather than video and audio-based steganographic systems. This paper aims to review different techniques practiced in steganography secure systems and specifically focused on Advanced Encryption Systems, Elliptic Curve Cryptography, and other hybrid systems since they are primarily used among developers and researchers in data security. Overall, developing an efficient security system based on steganography should be resilient to different types of third-party attacks and consider data integrity and data confidentiality to prevent loss of information.
Steganography, Data Security, Advanced Encryption System, Third Party Attack Elliptic Curve Cryptography
Короткий адрес: https://sciup.org/15020259
IDR: 15020259 | DOI: 10.5815/ijwmt.2026.02.03