Improving DCT-based JPEG Steganography using Adaptive LSB Matching for Resistance to Entropy-based Detection
Abstract
Keywords
Full Text:
PDFReferences
D. M. Abdullah et al., “Secure Data Transfer Over Internet using Image Steganography: Review,” Asian J. Res. Comput. SCI., Vol. 10, No. 3, hal. 33–52, Jul 2021, DOI: 10.9734/ajrcos/2021/v10i330243.
S. Ghoul, R. Sulaiman, dan Z. Shukur, “A Review on Security Techniques in Image Steganography,” Int. J. Adv. Comput. SCI. Appl., Vol. 14, No. 6, hal. 361–384, Jul 2023.
B. T. Ahmed, “A Systematic Overview of Secure Image Steganography,” Int. J. Adv. Appl. SCI., Vol. 10, No. 2, hal. 178–187, Jun 2021.
W. Luo et al., “A Comprehensive Survey of Digital Image Steganography and Steganalysis,” APSIPA Trans. Signal Inf. Process., Vol. 13, No. 1, hal. 1–67, Des 2024, DOI: 10.1561/116.20240038.
J. Subramanian dan R. Khilar, “Adaptive Invisible Steganography Leveraging Entropy-based Image Encryption with the Mimic Octopus Adaptive Framework (MOAF),” 8 Mei 2025. DOI: 10.21203/rs.3.rs-6300749/v1.
A. Shukla, “Efficient and Optimized usage of Various Image Formats (JPEG/JPG vs PNG) in Applications,” J. Math. Comput. Appl., Vol. 2, No. 3, hal. 1–3, Sep 2023.
I. A. J. Al Ali, Z. A. Abdulazeez, dan R. M. Aljubouri, “JPEG-Resistant DCT Steganography for Secure Communication,” Fusion Pract. Appl., Vol. 21, No. 1, hal. 245–264, 2026, DOI: 10.54216/FPA.210118.
M. Xiao, X. Li, B. Ma, X. Zhang, dan Y. Zhao, “Efficient Reversible Data Hiding for JPEG Images with Multiple Histograms Modification,” IEEE Trans. Circuits Syst. Video Technol., Vol. 31, No. 7, hal. 2535–2546, Jul 2021.
H. Ragab, H. Shaban, K. Ahmed, dan A.-E. Ali, “Digital Image Steganography and Reversible Data Hiding: Algorithms, Applications and Recommendations,” J. Image Graph., Vol. 13, No. 1, hal. 90–114, Feb 2025.
R. Apau, M. Asante, F. Twum, J. B. Hayfron-Acquah, dan K. O. Peasah, “Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature Review,” PLoS One, Vol. 19, No. 9, hal. e0308807, Sep 2024.
Z. Wang, G. Feng, Z. Qian, dan X. Zhang, “JPEG Steganography with Content Similarity Evaluation,” IEEE Trans. Cybern., Vol. 53, No. 8, hal. 5082–5093, Agu 2023.
F. Şahin, T. Çevik, dan M. Takaoğlu, “Review of the Literature on the Steganography Concept,” Int. J. Comput. Appl., Vol. 183, No. 2, hal. 38–46, Mei 2021, DOI: 10.5120/ijca2021921298.
S. Rahman et al., “A Comprehensive Study of Digital Image Steganographic Techniques,” IEEE Access, Vol. 11, hal. 6770–6791, 2023, DOI: 10.1109/ACCESS.2023.3237393.
W. I. A. Almazaydeh, “Image Steganography to Hide Unlimited Secret Text Size,” Int. J. Comput. SCI. Netw. Secur., Vol. 22, No. 4, hal. 73–82, Apr 2022.
S. Roy, N. Varish, S. I. Yaqoob, M. S. H. Ansari, dan A. T. Zamani, “DCT-based Robust Reversible Watermarking Technique based on Histogram Modification,” Int. J. Electr. Comput. Eng. Syst., Vol. 16, No. 6, hal. 473–484, Jun 2025.
N. V Dharwadkar, “Unveiling the Hidden Pixels: A Comprehensive Exploration of Digital Image Steganography Schemes,” J. Inf. Hiding Priv. Prot., Vol. 7, No. 1, hal. 60898, 2025.
S. Napitupulu, R. R. Siagian, R. Simanullang, K. D. Manalu, dan C. F. Silalahi, “Implementation of DCT based Steganography Algorithm to Hide Information in Images,” J. Majelis Paspama, Vol. 1, No. 2, hal. 12–21, 2023.
D. H. Zulfikar dan Hermanto, “Hamming Code in JPEG Image Steganography within the Discrete Cosine Transform Domain,” J. Appl. Informatics Comput., Vol. 9, No. 3, hal. 868–875, Jun 2025.
D. Pandey et al., “Secret Data Transmission using Advance Steganography and Image Compression,” Int. J. Nonlinear Anal. Appl., Vol. 12, hal. 1243–1257, 2021.
DOI: https://doi.org/10.32520/stmsi.v15i3.6002
Article Metrics
Abstract view : 0 timesPDF - 0 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.







