Uncovering Hidden Data a Comparative Study of Statistical Detection Models for Grayscale Image Steganography
Keywords:
statistical steganalysis, histogram analysis, RS method, chi-square test, LSB embeddingAbstract
With the widespread use of digital images in communication and storage, detecting hidden information embedded through steganography has become increasingly important for information security. This review presents a comparative analysis of three classical statistical steganalysis techniques — Histogram-based method, RS (Regular-Singular) analysis, and Chi-square test — applied to grayscale images. Each method's underlying principles, sensitivity to embedding rates, computational complexity, and robustness are systematically discussed. Experimental results on BMP image datasets with varying embedding rates highlight their respective strengths and limitations, including detection accuracy, processing efficiency, and error characteristics. The review also explores the adaptability of these methods to different embedding scenarios and potential improvements through multi-scale analysis and hybrid approaches. This work aims to provide researchers and practitioners with a comprehensive understanding of foundational statistical steganalysis methods and to guide future developments in image steganography detection.
References
1. R. Apau, M. Asante, F. Twum, J. Ben Hayfron-Acquah, and K. O. Peasah, "Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review," PLoS One, vol. 19, no. 9, p. e0308807, 2024, doi: 10.1371/journal.pone.0308807.
2. Y. Y. Demircan and S. Ozekes, "A Novel LSB Steganography Technique Using Image Segmentation," J. Univers. Comput. Sci., vol. 30, no. 3, 2024, doi: 10.3897/jucs.105702.
3. K. F. Rafat and S. M. Sajjad, "Advancing reversible LSB steganography: Addressing imperfections and embracing pioneering techniques for enhanced security," IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3468988.
4. M. Njoum, R. Sulaiman, Z. Shukur, and F. Qamar, "High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution," Comput. Mater. Continua, vol. 81, no. 1, 2024, doi: 10.32604/cmc.2024.050090.
5. R. Deval, N. Gupte, J. K. Pinto, A. R. Modak, A. Verma, A. Sharma, et al., "Exploring advanced steganography techniques for secure digital image communication: A comparative analysis and performance evaluation," Int. J. Electron. Secur. Digit. Fo-rensics, vol. 17, no. 1–2, pp. 233–266, 2025, doi: 10.1504/IJESDF.2025.143471.
6. A. F. M. Abadin, R. Sulaiman, and M. K. Hasan, "Randomization Strategies in Image Steganography Techniques: A Review," Comput. Mater. Continua, vol. 80, no. 2, 2024, doi: 10.32604/cmc.2024.050834.
7. K. D. Michaylov and D. K. Sarmah, "Steganography and steganalysis for digital image enhanced forensic analysis and recommendations," J. Cyber Secur. Technol., vol. 9, no. 1, pp. 1–27, 2025, doi: 10.1080/23742917.2024.2304441.
8. K. F. Rafat and S. M. Sajjad, "Reversing the Irreversible LSB Steganography: Transformative Advances in Reversible Data Hiding," in Proc. 6th Int. Conf. Adv. Comput. Sci. (ICACS), Feb. 2025, pp. 1–8, doi: 10.1109/ICACS64902.2025.10937874.
9. W. Alexan, E. Mamdouh, A. Aboshousha, Y. S. Alsahafi, M. Gabr, and K. M. Hosny, "Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images," IET Image Process., vol. 18, no. 13, pp. 4189–4206, 2024, doi: 10.1049/ipr2.13242.
10. L. C. Chin, Y. C. Li, H. M. Hsieh, and C. M. Wang, "TIRDH: A Novel Three-Shadow-Image Reversible Data Hiding Algorithm Using Weight and Modulo," IEEE Access, 2025, doi: 10.1109/ACCESS.2025.3552661.
11. C. F. Lee and K. C. Chan, "A novel dual image reversible data hiding scheme based on vector coordinate with triangular order coding," IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3421545.
12. K. F. Rafat and S. M. Sajjad, "Mastering Concealment: Dual-Veil and the Evolution of Secure Data Transmission," in Proc. 6th Int. Conf. Adv. Comput. Sci. (ICACS), Feb. 2025, pp. 1–8, doi: 10.1109/ICACS64902.2025.10937884.
13. S. H. O. Hashemi, M. H. Majidi, and S. Khorashadizadeh, "A new architecture based ResNet for steganography in color images," Multimed. Tools Appl., pp. 1–20, 2024, doi: 10.1007/s11042-024-19675-x.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Chengping Ye, Mogilevskaya Nadezhda S. (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.