“…Table 1 provides a summary of key information from several techniques, considering factors such as the number of security layers, encryption functions used, and steganography methods employed. Various encryption techniques have been employed, including XOR operation, complement rule, shift operation, LBP operation, MSB and LSB values, 2-bit or 4-bit DNA conversion, Keccak, Feistel network, amino acid–based methods, AES, RSA, ElGamal, Paillier, and Payfair cipher techniques ( Siddaramappa & Ramesh, 2015 ; Srilatha & Murali, 2016 ; Mavanai et al, 2019 ; Niu et al, 2019 ; Biswas et al , 2019 ; Hamed et al, 2018 ). Additionally, various techniques have been used for the hiding process, such as least significant bit (LSB), most significant bit (MSB), knight tour, ambiguity bits, lsbase, and adjacent base techniques ( Nie et al, 2019 ; Msallam, 2020 ; Sajisha & Mathew, 2017 ).…”