K. Kalai Selvi

Work place: Government College of Engineering, Tirunelveli, Tamil Nadu, India.

E-mail:

Website:

Research Interests:

Biography

K.Kalai Selvi completed B.E (Electronics & Communication Engineering) in 2003 at Government College of
Engineering, Tirunelveli, Tamil Nadu, India & M.E (Optical Communication) in 2010 at Alagappa Chettiar
Government College of Engineering & Technology, Karaikudi, Tamil Nadu, India. Working as Assistant
Professor in Government College of Engineering, Tirunelveli, Tamil Nadu. Has 15 years of teaching
experience.

Author Articles
A Comprehensive Review of Steganography Based Data Security System

By R. Anusha Padmavathi K. S. Dhanalakshmi K. Kalai Selvi

DOI: https://doi.org/10.5815/ijwmt.2026.02.03, Pub. Date: 8 Apr. 2026

The recent information and technology developments have impacted data utilization and showed the importance of storing different data types for various purposes. The huge amount of data exchanged between systems through the web, networks, and data storage systems are prone to third-party attacks and demands an effective data security system irrespective of the application. Researchers and developers have secured data using different steganography and cryptography techniques. Steganography uses different mediums to hide sensitive data such as images, videos, text, and audio. This review study discussed the importance of recent trends in steganography and cryptography systems in data security. Various methods and techniques of steganography and their hybrid systems, along with cryptography, have produced efficient results for data security. These methods and techniques are thoroughly reviewed to understand the development of a secure system based on steganography. The image-based steganography systems are widely used in several studies rather than video and audio-based steganographic systems. This paper aims to review different techniques practiced in steganography secure systems and specifically focused on Advanced Encryption Systems, Elliptic Curve Cryptography, and other hybrid systems since they are primarily used among developers and researchers in data security. Overall, developing an efficient security system based on steganography should be resilient to different types of third-party attacks and consider data integrity and data confidentiality to prevent loss of information.

[...] Read more.
Other Articles