Table 2 State-of-the-art comparison of secure data transmission approaches.

From: A secure and imperceptible communication system for sharing co-ordinate data

Author and year

Algorithms used

Security achievements

Limitations

Chen et al. (2024)

\(\bullet\) Deep autoencoder

\(\bullet\) AES encryption

\(\bullet\) High compression

\(\bullet\) AES-layered protection

\(\bullet\) Low imperceptibility under constrained bandwidth

Fang & Li (2025)

\(\bullet\) Lightweight cryptographic protocol

\(\bullet\) Low latency

\(\bullet\) IoT battlefield readiness

\(\bullet\) Lacks image-based concealment layer

Verma et al. (2025)

\(\bullet\) LSB steganography

\(\bullet\) Adversarial detector

\(\bullet\) High accuracy detection of LSB in satellite images

\(\bullet\) Demonstrates weaknesses of traditional LSB models

Rustad et al. (2023)

\(\bullet\) Discrete wavelet transform (DWT)

\(\bullet\) Huffman encoding

\(\bullet\) Moderate tamper resistance

\(\bullet\) High computational cost

\(\bullet\) Poor suitability for real-time ops

Rahman et al. (2023)

\(\bullet\) Multi-level encryption (MLE)

\(\bullet\) LSB steganography

\(\bullet\) Good integrity

\(\bullet\) Low computation cost

\(\bullet\) Poor scalability and image quality

Proposed system

\(\bullet\) AES encryption

\(\bullet\) Hash-based LSB

\(\bullet\) Colour plane splicing

\(\bullet\) High imperceptibility (PSNR > 80 dB)

\(\bullet\) Secure embedded key exchange

\(\bullet\) Scalable payload

\(\bullet\) Requires access to a large image set

\(\bullet\) Multi-image sync adds processing load