Table 1 Review of related existing systems and their weaknesses/drawbacks.
From: A secure and imperceptible communication system for sharing co-ordinate data
Paper | Approach/methodology used | Drawbacks |
|---|---|---|
Xie et al.25 | \(\bullet\) Novel multiple-base colour image steganography scheme \(\bullet\) Uses a compound sinusoidal discrete memristor map | \(\bullet\) Depends only on inserting payload data in the image’s edge area \(\bullet\) Limited data capacity \(\bullet\) Easier to detect modifications in smooth texture regions |
Alkhliwi26 | \(\bullet\) Uses an inverted LSB method with an adaptive pattern for steganography \(\bullet\) Improves the perceptual transparency of the image | \(\bullet\) Strict restrictions on payload limit \(\bullet\) Cannot scale for sending large co-ordinate data |
Tayyeh & Al-Jumaili27 | \(\bullet\) Presents a combination of LSB and Deflate compression algorithm for image steganography | \(\bullet\) Quality of embedded images is low \(\bullet\) Imperceptibility is degraded \(\bullet\) Time-consuming for critical data transmission |
Rustad et al.28 | \(\bullet\) Uses Discrete Wavelet Transform (DWT) for the decomposition of stego-images into sub-bands \(\bullet\) Huffman encoding is used to determine the embedding bits | \(\bullet\) Compromises on computational time and resources \(\bullet\) Unsuitable for sending critical information like co-ordinates |
Rahman et al.29 | \(\bullet\) Uses a method combining Huffman code and Least Significant bit (LSB) based image steganography \(\bullet\) Multi-level encryption (MLE) provides high security, low computation and tamper protection | \(\bullet\) Size of the embedded secret message cannot be more than 20 KB \(\bullet\) Requires multiple transmissions to send large sizes of data \(\bullet\) Imperceptibility is very low |