QUANTITATIVE ASSESSMENT OF THE QUALITY AND ROBUSTNESS OF SELECTED STEGANOGRAPHIC ALGORITHMS
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1105Keywords:
algorithms, steganography, steganographic methods, quantitative metrics, evaluationAbstract
This paper presents the results of a comparative analysis of three widely used steganographic approaches—LSB (Least Significant Bit), DCT (Discrete Cosine Transform), and PVD (Pixel Value Differencing)—applied to embedding textual messages into digital images with varying sizes and resolutions. The main objective of the study is to identify the strengths and weaknesses of each method through the use of quantitative metrics that provide an objective evaluation of the quality and robustness of steganographic algorithms.
Four metrics were selected for the analysis: Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Normalized Cross-Correlation (NCC). These indicators make it possible to quantitatively assess the degree of image distortion as well as the preservation of structural properties after the information-hiding process.
Experimental results demonstrate that the LSB algorithm achieves the highest image quality with virtually imperceptible visual distortions. In contrast, the DCT method exhibits more noticeable degradation, although it may be suitable in scenarios where a reduction in image quality is acceptable. The PVD algorithm showed the shortest execution time and provided a balanced combination of quality, robustness, and performance, indicating its potential suitability for systems focused on high-speed data processing.
The conducted study confirms the effectiveness of using a set of quantitative metrics for comprehensive comparison of steganographic methods. The proposed approach enables a deeper analysis of algorithm behavior under various conditions and forms a foundation for the development of adaptive steganographic solutions aimed at enhancing information security.
Downloads
References
Горпенюк А., Стороженко А. Дослідження та порівняльний аналіз стеганографічних методів для впровадження даних у цифрові файли. Вісник Національного технічного університету України"ЛЬВІВСЬКА ПОЛІТЕХНІКА". 2012. № 741. С. 2–4.
Денисюк В. Cтеганографічний алгоритм захисту даних з використанням файлів зображень. Ефективна економіка. 2017. № 5. URL: http://www.economy.nayka.com.ua/?op=1&z=5584. (date of access: 07.05.2025)
Клименко Л. А. Аналіз методів стиснення зображень на основі дискретно - косинусного перетворення / Л. А. Клименко, А. Ю. Гордієнко // Інформаційно-керуючі системи на залізничному транспорті. 2019. № 5. С. 24-31.
Швідченко І. Методи виявлення стеганографічного приховання інформації в зображеннях. Вісник Національного технічного університету України “ЛЬВІВСЬКА ПОЛІТЕХНІКА". 2012. № 741. С. 1-6.
A Method Combining Discrete Cosine Transform with Attention for Multi-Temporal Remote Sensing Image Matching / Q. Zeng et al. Sensors. 2025. Vol. 25, no. 5. P. 1345. URL: https://doi.org/10.3390/s25051345 (date of access: 29.01.2026).
Graphical user interfaces with ctk. Python documentation. URL: https://docs.python.org/3/library/tkinter.html (date of access: 08.07.2025).
Helmrich C., Bosse S., Schwarz H., Marpe D., and Wiegand T. A Study Of The Extended Perceptually Weighted Peak Signal-To-Noise Ratio (Xpsnr) For Video Compression With Different Resolutions And Bit Depths. ITU Journal: ICT Discoveries, Vol. 3(1), 29 May 2020
Hidayasari N., Yanto F. Analysis of Least Significant Bit Method Using Sequential Encoding-Decoding in Steganography Digital Image. Proceeding International Conference on Science and Engineering. 2020. Vol. 3. P. 201–205. URL: https://doi.org/10.14421/icse.v3.498 (date of access: 29.01.2026)
Hiding data in images using steganography techniques with compression algorithms / O. F. A. Wahab et al. TELKOMNIKA (telecommunication computing electronics and control). 2019. Vol. 17, no. 3. P. 1168.
Image Steganography Using Pixel Value Differencing (PVD) Technique Based on Firefly Algorithm / O. M. Alade et al. Journal of Scientific Research and Reports. 2021. P. 80–86. URL: https://doi.org/10.9734/jsrr/2021/v27i730414 (date of access: 29.01.2026).
Image quality assessment: from error visibility to structural similarity / Z. Wang et al. IEEE transactions on image processing. 2004. Vol. 13, no. 4. P. 600–612.
Jianwen Luo, Konofagou E. E. A fast normalized cross-correlation calculation method for motion estimation. IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control. 2010. Vol. 57, no. 6. P. 1347–1357. URL: https://doi.org/10.1109/tuffc.2010.1554 (date of access: 29.01.2026).
Lorem Ipsum - All the facts - Lipsum generator. LoremIpsum - All the facts - Lipsum generator. URL: https://www.lipsum.com/ (date of access: 15.09.2025).
Mara D. S. Computer forensic in image steganography. International journal for research in applied science and engineering technology. 2022. Vol. 10, no. 5. P. 3831–3842.
Numpy. PyPI. URL: https://pypi.org/project/numpy/ (date of access: 15.08.2025).
Opencv-python. PyPI. URL: https://pypi.org/project/opencv-python/ (date of access: 12.08.2025).
Pillow. PyPI. URL: https://pypi.org/project/pillow/ (date of access: 05.08.2025).
Tseng H.-W., Leng H.-S. A steganographic method based on pixel-value differencing and the perfect square number. Journal of applied mathematics. 2013. Vol. 2013. P. 1–8.
XSIM: A structural similarity index measure optimized for MRI QSM / C. Milovic et al. Magnetic Resonance in Medicine. 2024. URL: https://doi.org/10.1002/mrm.30271 (date of access: 29.01.2026).
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Тетяна Гришанович, Богдан Буткевич

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.