Improving DCT-based JPEG Steganography using Adaptive LSB Matching for Resistance to Entropy-based Detection

Intan Utami, Senie Destya, Miko Kastomo Putro

Abstract


Data transmission security has become a critical issue in the digital era, where steganography plays an important role in concealing confidential information within digital media. A key limitation of conventional Discrete Cosine Transform (DCT)-based steganography in JPEG images is its vulnerability to statistical detection through entropy analysis, as well as the risk of significant degradation in visual quality. This study aims to enhance DCT-based steganography techniques to minimize entropy-based detection while maintaining an optimal Peak Signal-to-Noise Ratio (PSNR). The proposed method employs an Adaptive LSB Matching approach by embedding messages into low-to-mid frequency coefficients using an adjustment mechanism (x±1). The performance of this method is then compared with the standard DCT approach. Experimental results show that the proposed method is able to preserve visual quality, achieving an average PSNR of 40.41 dB under maximum payload conditions, while reducing the entropy difference (ΔH) to 0.00251. These findings demonstrate that the developed technique is more robust against statistical steganalysis attacks and provides better visual fidelity compared to conventional methods.

Keywords


image steganography; discrete cosine transform; entropy analysis; LSB matching; information security

Full Text:

PDF

References


D. M. Abdullah et al., “Secure Data Transfer Over Internet using Image Steganography: Review,” Asian J. Res. Comput. SCI., Vol. 10, No. 3, hal. 33–52, Jul 2021, DOI: 10.9734/ajrcos/2021/v10i330243.

S. Ghoul, R. Sulaiman, dan Z. Shukur, “A Review on Security Techniques in Image Steganography,” Int. J. Adv. Comput. SCI. Appl., Vol. 14, No. 6, hal. 361–384, Jul 2023.

B. T. Ahmed, “A Systematic Overview of Secure Image Steganography,” Int. J. Adv. Appl. SCI., Vol. 10, No. 2, hal. 178–187, Jun 2021.

W. Luo et al., “A Comprehensive Survey of Digital Image Steganography and Steganalysis,” APSIPA Trans. Signal Inf. Process., Vol. 13, No. 1, hal. 1–67, Des 2024, DOI: 10.1561/116.20240038.

J. Subramanian dan R. Khilar, “Adaptive Invisible Steganography Leveraging Entropy-based Image Encryption with the Mimic Octopus Adaptive Framework (MOAF),” 8 Mei 2025. DOI: 10.21203/rs.3.rs-6300749/v1.

A. Shukla, “Efficient and Optimized usage of Various Image Formats (JPEG/JPG vs PNG) in Applications,” J. Math. Comput. Appl., Vol. 2, No. 3, hal. 1–3, Sep 2023.

I. A. J. Al Ali, Z. A. Abdulazeez, dan R. M. Aljubouri, “JPEG-Resistant DCT Steganography for Secure Communication,” Fusion Pract. Appl., Vol. 21, No. 1, hal. 245–264, 2026, DOI: 10.54216/FPA.210118.

M. Xiao, X. Li, B. Ma, X. Zhang, dan Y. Zhao, “Efficient Reversible Data Hiding for JPEG Images with Multiple Histograms Modification,” IEEE Trans. Circuits Syst. Video Technol., Vol. 31, No. 7, hal. 2535–2546, Jul 2021.

H. Ragab, H. Shaban, K. Ahmed, dan A.-E. Ali, “Digital Image Steganography and Reversible Data Hiding: Algorithms, Applications and Recommendations,” J. Image Graph., Vol. 13, No. 1, hal. 90–114, Feb 2025.

R. Apau, M. Asante, F. Twum, J. B. Hayfron-Acquah, dan K. O. Peasah, “Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature Review,” PLoS One, Vol. 19, No. 9, hal. e0308807, Sep 2024.

Z. Wang, G. Feng, Z. Qian, dan X. Zhang, “JPEG Steganography with Content Similarity Evaluation,” IEEE Trans. Cybern., Vol. 53, No. 8, hal. 5082–5093, Agu 2023.

F. Şahin, T. Çevik, dan M. Takaoğlu, “Review of the Literature on the Steganography Concept,” Int. J. Comput. Appl., Vol. 183, No. 2, hal. 38–46, Mei 2021, DOI: 10.5120/ijca2021921298.

S. Rahman et al., “A Comprehensive Study of Digital Image Steganographic Techniques,” IEEE Access, Vol. 11, hal. 6770–6791, 2023, DOI: 10.1109/ACCESS.2023.3237393.

W. I. A. Almazaydeh, “Image Steganography to Hide Unlimited Secret Text Size,” Int. J. Comput. SCI. Netw. Secur., Vol. 22, No. 4, hal. 73–82, Apr 2022.

S. Roy, N. Varish, S. I. Yaqoob, M. S. H. Ansari, dan A. T. Zamani, “DCT-based Robust Reversible Watermarking Technique based on Histogram Modification,” Int. J. Electr. Comput. Eng. Syst., Vol. 16, No. 6, hal. 473–484, Jun 2025.

N. V Dharwadkar, “Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes,” J. Inf. Hiding Priv. Prot., Vol. 7, No. 1, hal. 60898, 2025.

S. Napitupulu, R. R. Siagian, R. Simanullang, K. D. Manalu, dan C. F. Silalahi, “Implementation of DCT based Steganography Algorithm to Hide Information in Images,” J. Majelis Paspama, Vol. 1, No. 2, hal. 12–21, 2023.

D. H. Zulfikar dan Hermanto, “Hamming Code in JPEG Image Steganography within the Discrete Cosine Transform Domain,” J. Appl. Informatics Comput., Vol. 9, No. 3, hal. 868–875, Jun 2025.

D. Pandey et al., “Secret Data Transmission using Advance Steganography and Image Compression,” Int. J. Nonlinear Anal. Appl., Vol. 12, hal. 1243–1257, 2021.




DOI: https://doi.org/10.32520/stmsi.v15i3.6002

Article Metrics

Abstract view : 0 times
PDF - 0 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.