![]()
Arnav Joshipura
Independent Researcher
India
Abstract
Image steganography is the art and science of concealing information within digital images so that the very existence of the message remains hidden. Among the many techniques proposed prior to 2018, hybrid approaches combining frequency-domain transforms such as the Discrete Cosine Transform (DCT) with spatial-domain methods like Least Significant Bit (LSB) substitution have shown promising trade-offs between imperceptibility, payload capacity, and robustness against steganalysis. This manuscript presents a comprehensive study on the fusion of DCT-based embedding and LSB substitution for hiding binary data within JPEG images. We begin with an overview of relevant techniques up to 2018, followed by detailed case studies applying these methods to standard test images. Next, we describe the methodology for embedding and extracting payloads, including block-based DCT coefficient modification and subsequent bit masking in spatial pixels. Experimental results assess imperceptibility via peak signal-to-noise ratio (PSNR) and structural similarity (SSIM), payload capacity, and resistance to common steganalysis attacks. Finally, we discuss conclusions and recommendations for optimizing hybrid steganographic schemes in engineering applications aligned with technologies available through 2018.
Keywords
Image steganography, Discrete Cosine Transform, LSB substitution, JPEG, imperceptibility, payload capacity, PSNR, SSIM
REFERENCES
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3–4), 313–336.
Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. IEEE Computer, 31(2), 26–34.
Westfeld, A., & Pfitzmann, A. (2001). Attacks on steganographic systems. In Information Hiding (Lecture Notes in Computer Science, Vol. 2137, pp. 61–76). Springer.
Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44.
Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474.
Fridrich, J., Goljan, M., & Du, R. (2001). Reliable detection of LSB steganography in color and grayscale images. In Proceedings of the ACM Workshop on Multimedia and Security (pp. 27–30).
Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.
Luo, W., Huang, J., & Huang, H. (2008). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201–214.