Table 1 Review of related existing systems and their weaknesses/drawbacks.

From: A secure and imperceptible communication system for sharing co-ordinate data

Paper

Approach/methodology used

Drawbacks

Xie et al.25

\(\bullet\) Novel multiple-base colour image steganography scheme

\(\bullet\) Uses a compound sinusoidal discrete memristor map

\(\bullet\) Depends only on inserting payload data in the image’s edge area

\(\bullet\) Limited data capacity

\(\bullet\) Easier to detect modifications in smooth texture regions

Alkhliwi26

\(\bullet\) Uses an inverted LSB method with an adaptive pattern for steganography

\(\bullet\) Improves the perceptual transparency of the image

\(\bullet\) Strict restrictions on payload limit

\(\bullet\) Cannot scale for sending large co-ordinate data

Tayyeh & Al-Jumaili27

\(\bullet\) Presents a combination of LSB and Deflate compression algorithm for image steganography

\(\bullet\) Quality of embedded images is low

\(\bullet\) Imperceptibility is degraded

\(\bullet\) Time-consuming for critical data transmission

Rustad et al.28

\(\bullet\) Uses Discrete Wavelet Transform (DWT) for the decomposition of stego-images into sub-bands

\(\bullet\) Huffman encoding is used to determine the embedding bits

\(\bullet\) Compromises on computational time and resources

\(\bullet\) Unsuitable for sending critical information like co-ordinates

Rahman et al.29

\(\bullet\) Uses a method combining Huffman code and Least Significant bit (LSB) based image steganography

\(\bullet\) Multi-level encryption (MLE) provides high security, low computation and tamper protection

\(\bullet\) Size of the embedded secret message cannot be more than 20 KB

\(\bullet\) Requires multiple transmissions to send large sizes of data

\(\bullet\) Imperceptibility is very low