A Comprehensive Review of Steganography Based Data Security System

PDF (413KB), PP.26-35

Views: 0 Downloads: 0

Author(s)

R. Anusha Padmavathi 1 K. S. Dhanalakshmi 2 K. Kalai Selvi 3

1. Department of Electronics and Communication Engineering, Government College of Engineering, Thirunelveli, Tamil Nadu, India.

2. Department of Electronics and Communication Engineering, Kalasalingam Academy of Research and Education, Krishnankoil, Virudhunagar District, Tamil Nadu, India.

3. Government College of Engineering, Tirunelveli, Tamil Nadu, India.

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2026.02.03

Received: 21 Jul. 2025 / Revised: 24 Aug. 2025 / Accepted: 29 Jan. 2026 / Published: 8 Apr. 2026

Index Terms

Steganography, Data Security, Advanced Encryption System, Third Party Attack Elliptic Curve Cryptography

Abstract

The recent information and technology developments have impacted data utilization and showed the importance of storing different data types for various purposes. The huge amount of data exchanged between systems through the web, networks, and data storage systems are prone to third-party attacks and demands an effective data security system irrespective of the application. Researchers and developers have secured data using different steganography and cryptography techniques. Steganography uses different mediums to hide sensitive data such as images, videos, text, and audio. This review study discussed the importance of recent trends in steganography and cryptography systems in data security. Various methods and techniques of steganography and their hybrid systems, along with cryptography, have produced efficient results for data security. These methods and techniques are thoroughly reviewed to understand the development of a secure system based on steganography. The image-based steganography systems are widely used in several studies rather than video and audio-based steganographic systems. This paper aims to review different techniques practiced in steganography secure systems and specifically focused on Advanced Encryption Systems, Elliptic Curve Cryptography, and other hybrid systems since they are primarily used among developers and researchers in data security. Overall, developing an efficient security system based on steganography should be resilient to different types of third-party attacks and consider data integrity and data confidentiality to prevent loss of information.

Cite This Paper

R. Anusha Padmavathi, K. S. Dhanalakshmi, K. Kalai Selvi, "A Comprehensive Review of Steganography Based Data Security System", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.16, No.2, pp. 26-35, 2026. DOI:10.5815/ijwmt.2026.02.03

Reference

[1]T. Sridevi, P. M. Rao, and P. Ramaraju, "Wireless sensor data mining for e-commerce applications," Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, pp. 462-470, 2018.
[2]P. Chinnasamy and P. Deepalakshmi, "HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud," Journal of Ambient Intelligence and Humanized Computing, pp. 1-19, 2021.    
[3]M. Islam, T. Tanni, S. Parvin, M. Sultana, and A. Siddiqa, "A modified LSB image steganography method using filtering algorithm and stream of password," Information Security Journal: A Global Perspective, vol. 30, pp. 359-370, 2021.
[4]N. Mukherjee, G. Paul, and S. K. Saha, "Two-point FFT-based high capacity image steganography using calendar-based message encoding," Information Sciences, vol. 552, pp. 278-290, 2021.
[5]M. M. Hashim, A. A. Mahmood, and M. Q. Mohammed, "A pixel contrast based medical image steganography to ensure and secure patient data," International Journal of Nonlinear Analysis and Applications, vol. 12, pp. 1885-1904, 2021.
[6]H. Milad, O. Haydar, and A. Diab, "Enhancement the Security and Efficiency of Video Steganography Using Frame Selection, Data Compression, and Encryption."
[7]T. S. Gupta and R. Srivastava, "Advanced-Data Encryption using Three-Layered Hybrid Cryptosystem and Secured Key Storing using Steganography," 2021.
[8]R. Tanwar, U. Pilania, M. Zamani, and A. A. Manaf, "An Analysis of 3D Steganography Techniques," Electronics, vol. 10, p. 2357, 2021.
[9]H. A. Khan, R. Abdulla, S. K. Selvaperumal, and A. Bathich, "IoT based on secure personal healthcare using RFID technology and steganography," International Journal of Electrical & Computer Engineering (2088-8708), vol. 11, 2021.
[10]D. Pandey, S. Wairya, R. S. Al Mahdawi, S. A.-d. M. Najim, H. A. Khalaf, S. M. Al Barzinji, et al., "Secret data transmission using advanced steganography and image compression," International Journal of Nonlinear Analysis and Applications, vol. 12, pp. 1243-1257, 2021.
[11]F. Shadmand, I. Medvedev, and N. Gonc̗alves, "CodeFace: A Deep Learning Printer-Proof Steganography for Face Portraits," IEEE Access, vol. 9, pp. 167282-167291, 2021.
[12]R. Gurunath and D. Samanta, "Insights into Artificial Neural Network techniques, and its Application in Steganography," in Journal of Physics: Conference Series, 2021, p. 012043.
[13]S. Ghamizi, M. Cordy, M. Papadakis, and Y. Le Traon, "Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application," in Proceedings of the IEEE/CVF International Conference on Computer Vision, 2021, pp. 31-40.
[14]Y. Zhang, "Test and verification of AES used for image encryption," 3D Research, vol. 9, pp. 1-27, 2018.
[15]Ü. Çavuşoğlu, S. Kaçar, A. Zengin, and I. Pehlivan, "A novel hybrid encryption algorithm based on chaos and S-AES algorithm," Nonlinear Dynamics, vol. 92, pp. 1745-1759, 2018.
[16]Z. Qiao, S. El Assad, and I. Taralova, "Design of secure cryptosystem based on chaotic components and AES S-Box," AEU-International Journal of Electronics and Communications, vol. 121, p. 153205, 2020.
[17]C.-H. Lin, G.-H. Hu, C.-Y. Chan, and J.-J. Yan, "Chaos-Based Synchronized Dynamic Keys and Their Application to Image Encryption with an Improved AES Algorithm," Applied Sciences, vol. 11, p. 1329, 2021.
[18]S. A. Mehdi, K. K. Jabbar, and F. H. Abbood, "Image encryption based on the novel 5D hyper-chaotic system via improved AES algorithm," International Journal of Civil Engineering and Technology, vol. 9, pp. 1841-1855, 2018.
[19]A. A. Thinn and M. M. S. Thwin, "Modification of AES algorithm by using second key and modified subbytes operation for text encryption," in Computational science and technology, ed: Springer, 2019, pp. 435-444.
[20]M. Alotaibi, D. Al-hendi, B. Alroithy, M. AlGhamdi, and A. Gutub, "Secure mobile computing authentication utilizing hash, cryptography and steganography combination," Journal of Information Security and Cybercrimes Research, vol. 2, pp. 73-82, 2019.
[21]M. M. Abur, S. B. Junaidu, S. E. Abdullahi, and A. A. Obiniyi, "Securing User's Attributes on Transit to the Cloud using AES-128 bits Cryptography and DCTM3 Steganography Techniques," Scientific and practical cyber security journal, 2019.
[22]M. E. Shaheen and A. H. S. Saad, "Using Disinformation to Promote the Security of SMMWB Image Steganography Method," International Journal of Computer Applications, vol. 975, p. 8887.
[23]M. Saračević, S. Adamović, V. Miškovic, N. Maček, and M. Šarac, "A novel approach to steganography based on the properties of Catalan numbers and Dyck words," Future Generation Computer Systems, vol. 100, pp. 186-197, 2019.
[24]S. Saraireh, J. Al-Saraireh, and M. Saraireh, "Integration of Hash-Crypto-Steganography for Efficient Security Technique," International Journal of Circuits, Systems, and Signals Processing, vol. 12, pp. 274-278, 2018.
[25]A. Sengupta and M. Rathor, "Crypto-based dual-phase hardware steganography for securing IP cores," IEEE Letters of the Computer Society, vol. 2, pp. 32-35, 2019.
[26]S. Beg, N. Ahmad, A. Anjum, M. Ahmad, A. Khan, F. Baig, et al., "S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain," Multimedia Tools and Applications, vol. 79, pp. 11667-11684, 2020.
[27]S. Wassim Alexan, M. ElBeltagy, and A. Aboshousha, "Image Encryption Through Lucas Sequence, S-Box and Chaos Theory."
[28]S. I. Batool, I. Younas, M. Khan, and N. Yaqoob, "A new technique for the construction of confusion component based on inverse LA-semigroups and its application in steganography," Multimedia Tools and Applications, pp. 1-21, 2021.
[29]A. ALabaichi, M. a. A. A. K. Al-Dabbas, and A. Salih, "Image steganography using least significant bit and secret map techniques," International journal of electrical & computer engineering (2088-8708), vol. 10, 2020.
[30]S. Kamil, M. Ayob, S. N. H. SHEIKHABDULLAH, and Z. Ahmad, "Challenges in multi-layer data security for video steganography revisited," Asia-Pacific J. Inf. Technol. Multimed, vol. 7, pp. 53-62, 2018.
[31]S. D. Tatavarthi and V. Enireddy, "HYBRID TECHNIQUE FOR HIGH PAYLOAD CAPACITY USING ECC AND STEGANOGRAPHY," Turkish Journal of Physiotherapy and Rehabilitation, vol. 32, p. 3.
[32]S. Rehman, N. Talat Bajwa, M. A. Shah, A. O. Aseeri, and A. Anjum, "Hybrid AES-ECC Model for the Security of Data over Cloud Storage," Electronics, vol. 10, p. 2673, 2021.
[33]J. Liu and Y. Zhang, "A Dynamic Steganography Method for Web Images with Average RunLength-Coding," Journal of Computer Science Research, vol. 3, 2021.
[34]R. Denis and P. Madhubala, "Evolutionary Computing Assisted Visually-Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment," International Journal of Computer Networks and Applications (IJCNA), vol. 7, pp. 208-230, 2020.
[35]E. S. B. Hureib and A. A. Gutub, "Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography," IJCSNS, vol. 20, p. 232, 2020.
[36]O. C. Abikoye, U. A. Ojo, J. B. Awotunde, and R. O. Ogundokun, "A safe and secured iris template using steganography and cryptography," Multimedia Tools and Applications, vol. 79, pp. 23483-23506, 2020.
[37]N. Al-Juaid and A. Gutub, "Combining RSA and audio steganography on personal computers for enhancing security," SN Applied Sciences, vol. 1, pp. 1-11, 2019.
[38]N. H. Hassoon, R. A. Ali, H. N. Abed, and A. A.-J. Alkhazraji, "Multilevel hiding text security using hybrid technique steganography and cryptography," International Journal of Engineering & Technology, vol. 7, pp. 3674-3677, 2018.
[39]N. A. Al-Juaid, A. A. Gutub, and E. A. Khan, "Enhancing PC data security via combining RSA cryptography and video based steganography," Journal of Information Security and Cybercrimes Research, vol. 1, pp. 5-13, 2018.
[40]A. Delmi, S. Suryadi, and Y. Satria, "Digital image steganography by using edge adaptive based chaos cryptography," in Journal of Physics: Conference Series, 2020, p. 012041.
[41]X. Duan, D. Guo, N. Liu, B. Li, M. Gou, and C. Qin, "A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network," IEEE Access, vol. 8, pp. 25777-25788, 2020.
[42]E. Hureib and A. A. Gutub, "Enhancing medical data security via combining elliptic curve cryptography and image steganography," Int. J. Comput. Sci. Netw. Secur.(IJCSNS), vol. 20, pp. 1-8, 2020.
[43]B. L. S. Prasanna, P. Meghana, and M. I. B. Venkateswarlu, "Double encryption using Private Key and Content Based Public Key," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 7, 2018.