Work place: Department of Electronics and Communication Engineering, Kalasalingam Academy of Research and Education, Krishnankoil, Virudhunagar District, Tamil Nadu, India.
E-mail:
Website:
Research Interests:
Biography
K. S. Dhanalakshmi working as Assistant Professor in the department of Electronics and Communication
Engineering, Kalasalingam Academy of Research and Education, Krishnankoil, VirudhunagarDistrict,
TamilNadu, India. I am graduated with BE degree in Electronics and Communication Engineering from Anna
University, Chennai in 2007 and M.Tech in Digital Communication and Network Engineering from
Kalasalingam University, Krishnankoil in 2011. I have received the PhD degree in Intrusion Detection System
for Wireless Networks from Kalasalingam Academy of Research and Education, Krishnankoil in 2018. My
area of interest is Wireless Network Security, Satellite Communication and Signal Processing.
By R. Anusha Padmavathi K. S. Dhanalakshmi K. Kalai Selvi
DOI: https://doi.org/10.5815/ijwmt.2026.02.03, Pub. Date: 8 Apr. 2026
The recent information and technology developments have impacted data utilization and showed the importance of storing different data types for various purposes. The huge amount of data exchanged between systems through the web, networks, and data storage systems are prone to third-party attacks and demands an effective data security system irrespective of the application. Researchers and developers have secured data using different steganography and cryptography techniques. Steganography uses different mediums to hide sensitive data such as images, videos, text, and audio. This review study discussed the importance of recent trends in steganography and cryptography systems in data security. Various methods and techniques of steganography and their hybrid systems, along with cryptography, have produced efficient results for data security. These methods and techniques are thoroughly reviewed to understand the development of a secure system based on steganography. The image-based steganography systems are widely used in several studies rather than video and audio-based steganographic systems. This paper aims to review different techniques practiced in steganography secure systems and specifically focused on Advanced Encryption Systems, Elliptic Curve Cryptography, and other hybrid systems since they are primarily used among developers and researchers in data security. Overall, developing an efficient security system based on steganography should be resilient to different types of third-party attacks and consider data integrity and data confidentiality to prevent loss of information.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals