Work place: Department of Electronics and Communication Engineering, Government College of Engineering, Thirunelveli, Tamil Nadu, India
E-mail: anushapadmavathiphd14@gmail.com
Website:
Research Interests:
Biography
R.Anusha Padmavathi working as Assistant Professor in the department of Electronics and Communication
Engineering, in GOVERNMENT COLLEGE OF ENGINEERING, THIRUNELVELI, TamilNadu, India. I had
graduated with BE degree in Electronics and Communication Engineering from Anna University, Chennai in
2012 and M.E in VLSI DESIGN from PSN ENGINEERING COLLEGE in THIRUNELVELI 2017. My area
of interest is Wireless Network Security, image processing and vlsi design.
By R. Anusha Padmavathi K. S. Dhanalakshmi K. Kalai Selvi
DOI: https://doi.org/10.5815/ijwmt.2026.02.03, Pub. Date: 8 Apr. 2026
The recent information and technology developments have impacted data utilization and showed the importance of storing different data types for various purposes. The huge amount of data exchanged between systems through the web, networks, and data storage systems are prone to third-party attacks and demands an effective data security system irrespective of the application. Researchers and developers have secured data using different steganography and cryptography techniques. Steganography uses different mediums to hide sensitive data such as images, videos, text, and audio. This review study discussed the importance of recent trends in steganography and cryptography systems in data security. Various methods and techniques of steganography and their hybrid systems, along with cryptography, have produced efficient results for data security. These methods and techniques are thoroughly reviewed to understand the development of a secure system based on steganography. The image-based steganography systems are widely used in several studies rather than video and audio-based steganographic systems. This paper aims to review different techniques practiced in steganography secure systems and specifically focused on Advanced Encryption Systems, Elliptic Curve Cryptography, and other hybrid systems since they are primarily used among developers and researchers in data security. Overall, developing an efficient security system based on steganography should be resilient to different types of third-party attacks and consider data integrity and data confidentiality to prevent loss of information.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals