Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 21 , Issue 1 , PP: 245-264, 2026 | Cite this article as | XML | Html | PDF | Full Length Article

JPEG-Resistant DCT Steganography for Secure Communication

Israa Abdulkadhim Jabbar Al Ali 1 , Zainab A. Abdulazeez 2 * , Rawaa.M.aljubouri 3

  • 1 College of Education for Human Sciences, University of Kerbala, Karbala City, Iraq - (israa.jabbar@uokerbala.edu.iq)
  • 2 College of Education for Human Sciences, University of Kerbala, Karbala City, Iraq - (zainab.abdulhameed@uokerbala.edu.iq)
  • 3 Presidency of University of Babylon, University of Babylon, Babylon, Iraq - (rawa.aljubouri18@uobabylon.edu.iq)
  • Doi: https://doi.org/10.54216/FPA.210118

    Received: February 18, 2025 Revised: May 20, 2025 Accepted: July 03, 2025
    Abstract

    In this work, the researchers presented an ingenious new way to conceal secret messages within images, a practice called steganography. This technique embedded secret messages within images undetectably. To embed the secret data, it applies a mathematical trick called Discrete Cosine Transform (DCT) that is commonly used to compress image files to hide the secret data in areas of the image that are not too complex or too simple. The algorithm adaptively selected embedding locations based on image texture to the appearance of the image, choosing the most appropriate places to hide the secret and the picture to appear normal. This new method of hiding data is more magical and less detectable than older methods, which modify the smallest details of an image (so-called Least Significant Bit techniques). It examines the patterns of the image such as whether it is smooth or has many details and selects obscure, secure locations to conceal the message. They tried this with 1,000 images, and in each image, they embedded a small message (a paragraph of text). The pictures came out great afterwards with just minor adjustments that most people would not have noticed. 95% of the buried messages could be dragged out flawlessly even after the images had been reduced in size with the JPEG. An artificial intelligence-based high-tech detection tool only detected the hidden data half the time 52%, a significant improvement over the older techniques where it located 85 percent or 65% of the secrets.

    Keywords :

    Steganography , Discrete Cosine Transform , Mid-Frequency Embedding , Texture-Adaptive Algorithm , JPEG Robustness , Steganalysis Resistance , Secure Communication

    References

    [1]       D. N. Tran, H. J. Zepernick, and T. M. Chu, “LSB data hiding in digital media: a survey,” EAI Endorsed Trans Ind Netw Intell Syst, vol. 2022, pp. 1–50, 2022.

     

    [2]       A. Nicolás‑Sánchez and F. J. Castro‑Toledo, “Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective,” Crime Sci, vol. 13, no. 1, p. 11, 2024. doi:10.1186/s40163-024-00209-7.

     

    [3]       M. Hussain, Q. Riaz, S. Saleem, A. Ghafoor, and K. H. Jung, “Enhanced adaptive data hiding method using LSB and pixel value differencing,” Multimed Tools Appl, vol. 80, no. 13, pp. 20381–20401, 2021. doi:10.1007/s11042-021-10652-2.

     

    [4]       K. F. Rafat and S. M. Sajjad, “Advancing reversible LSB steganography: addressing imperfections and embracing pioneering techniques for enhanced security,” IEEE Access, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/10695052/.

     

    [5]       D. Laishram and T. Tuithung, “A survey on digital image steganography: current trends and challenges,” in Proceedings of the 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018, pp. 26–27. [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3171494.

     

    [6]       Z. A. Alher, B. M. Al Imran, and I. Al Ali, “LSB as a steganography tool in information security,” in 5th International Conference on Communication Engineering and Computer Science (CIC‑COCOS’24), 2024, Cihan University‑Erbil, pp. 348–355. [Online]. Available: https://eprints.cihanuniversity.edu.iq/id/eprint/3322/.

     

    [7]       M. Baziyad, T. Rabie, I. Kamel, and M. Benkhelifa, “Polynomial fitting: enhancing the stego quality of DCT‑based steganography schemes,” Multimed Tools Appl, vol. 81, no. 30, pp. 43999–44019, 2022. doi:10.1007/s11042-022-13004-w.

     

    [8]       G. Emmanuel, G. H. Hungil, J. Maiga, and A. J. Santoso, “Information hiding in images using discrete cosine transform,” IOP Conf Ser Mater Sci Eng, vol. 1098, no. 5, p. 052083, 2021. [Online]. Available: https://iopscience.iop.org/article/10.1088/1757-899X/1098/5/052083/meta.

     

    [9]       S. A. El_Rahman, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information,” Comput Electr Eng, vol. 70, pp. 380–399, 2018. doi:10.1016/j.compeleceng.2016.09.001.

     

    [10]    K. K. Bohra and V. K. Soni, “Invisible watermarking using discrete cosine transform (DCT): a comprehensive exploration,” 2024. [Online]. Available: https://pdfs.semanticscholar.org/4489/da09131a4189e2fe922115a9288b685f1cdb.pdf.

     

    [11]    Y. Sanjalawe, S. Al‑Emari, S. Fraihat, M. Abualhaj, and E. Alzubi, “A deep learning–driven multi‑layered steganographic approach for enhanced data security,” Sci Rep, vol. 15, no. 1, p. 4761, 2025.

     

    [12]    A. Kumar, R. Rani, and S. Singh, “A survey of recent advances in image steganography,” Secur Priv, vol. 6, no. 3, p. e281, 2023.

     

    [13]    M. A. Aslam et al., “Image steganography using least significant bit (LSB)–a systematic literature review,” in 2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022, pp. 32–38. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9711628/.

     

    [14]    M. S. Subhedar and V. H. Mankar, “Secure image steganography using framelet transform and bidiagonal SVD,” Multimed Tools Appl, vol. 79, no. 3–4, pp. 1865–1886, 2020. doi:10.1007/s11042-019-08221-9.

     

    [15]    V. Kumar and D. Kumar, “A modified DWT‑based image steganography technique,” Multimed Tools Appl, vol. 77, pp. 13279–13308, 2018.

     

    [16]    W. Rehman, “A novel approach to image steganography using generative adversarial networks,” 2024. [Online]. Available: https://arxiv.org/abs/2412.00094. doi:10.48550/arXiv.2412.00094.

     

    [17]    O. F. AbdelWahab, A. I. Hussein, H. F. Hamed, H. M. Kelash, A. A. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms,” KOMNIKA Telecommun Comput Electron Control, vol. 17, no. 3, pp. 1168–1175, 2019.

     

    [18]    Z. A. Abdulazeez, I. A. Al Ali, B. M. MH, G. Kamil, and R. A. Mustafa, “An intelligent model to combat soybean plant disease based on random forest and support vector machine algorithms,” 2025. [Online]. Available: https://www.researchgate.net/profile/Zainab-A-Abdulazeez/publication/388490732_An_Intelligent_Model_to_combat_Soybean_Plant_Disease_based_on_Random_Forest_and_Support_Vector_Machine_Algorithms/links/679a79a052b58d39f25a8caf/An-Intelligent-Model-to-combat-Soybean-Plant-Disease-based-on-Random-Forest-and-Support-Vector-Machine-Algorithms.pdf.

     

    [19]    B. Song, P. Wei, S. Wu, Y. Lin, and W. Zhou, “A survey on deep‑learning‑based image steganography,” Expert Syst Appl, vol. 124390, 2024.

     

    [20]    M. Hamidi, M. El Haziti, H. Cherifi, and M. El Hassouni, “A hybrid robust image watermarking method based on DWT‑DCT and SIFT for copyright protection,” J Imaging, vol. 7, no. 10, p. 10, 2021. doi:10.3390/jimaging7100218.

     

    [21]    M. H. Kombrink, Z. J. M. Geradts, and M. Worring, “Image steganography approaches and their detection strategies: a survey,” ACM Comput Surv, vol. 57, no. 2, pp. 1–40, 2025. doi:10.1145/3694965.

     

    [22]    S. Bernard, P. Bas, J. Klein, and T. Pevný, “Backpack: a backpropagable adversarial embedding scheme,” IEEE Trans Inf Forensics Secur, 2022. [Online]. Available: https://hal.science/hal-03760241.

     

    [23]    A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” in Information Hiding, A. Pfitzmann, Ed. Berlin: Springer Berlin Heidelberg, 2000, pp. 61–76. doi:10.1007/10719724_5.

     

    [24]    S. Khan, S. Abdallah, I. Kamel, T. Rabie, and M. Baziyad, “On hiding secret information in medium frequency DCT components using least significant bits steganography,” Comput Model Eng Sci, vol. 118, no. 3, pp. 529–546, 2019.

     

    [25]    R. Mstafa, K. M. Elleithy, and E. Abdelfattah, “A robust and secure video steganography method in DWT‑DCT domains based on multiple object tracking and ECC,” IEEE Access, vol. 5, pp. 5354–5365, 2017.

     

    [26]    A. Smith, B. Johnson, and C. Lee, “A comprehensive survey on image processing techniques for data hiding,” Journal of Computer Science and Technology, vol. 35, no. 2, pp. 123-135, 2023. doi:10.1007/s11390-023-00567-1.

     

    [27]    Y. Huang, Z. Liu, Q. Wu, and X. Liu, “Robust image steganography against JPEG compression based on DCT residual modulation,” Signal Process, vol. 219, p. 109431, 2024.

     

    [28]    J. D. L. C. Ntivuguruzwa and T. Ahmad, “A convolutional neural network to detect possible hidden data in spatial domain images,” Cybersecurity, vol. 6, no. 1, p. 23, 2023. doi:10.1186/s42400-023-00156-x.

     

    [29]    S. Singh and T. J. Siddiqui, “Transform domain techniques for image steganography,” in Computer Vision: Concepts, Methodologies, Tools, and Applications, Hershey: IGI Global, 2018, pp. 170–186. [Online]. Available: https://www.igi-global.com/viewtitle.aspx?titleid=196954.

     

    [30]    A. A. Attaby, M. F. M. Ahmed, and A. K. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT‑M3,” Ain Shams Eng J, vol. 9, no. 4, pp. 1965–1974, 2018.

     

    [31]    N. J. De La Croix, T. Ahmad, and F. Han, “Comprehensive survey on image steganalysis using deep learning,” Array, vol. 100353, 2024.

     

    [32]    W. M. Eid, S. S. Alotaibi, H. M. Alqahtani, and S. Q. Saleh, “Digital image steganalysis: current methodologies and future challenges,” IEEE Access, vol. 10, pp. 92321–92336, 2022.

     

    [33]    O. Chernova, O. Ponomareva, Z. Arafat, and M. H. Albdairi, “International standards in information security disciplines,” in Proceedings of the 2022 Ural‑Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), 2022, pp. 328–330. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9923395/.

     

    Cite This Article As :
    Abdulkadhim, Israa. , A., Zainab. , , Rawaa.M.aljubouri. JPEG-Resistant DCT Steganography for Secure Communication. Fusion: Practice and Applications, vol. , no. , 2026, pp. 245-264. DOI: https://doi.org/10.54216/FPA.210118
    Abdulkadhim, I. A., Z. , R. (2026). JPEG-Resistant DCT Steganography for Secure Communication. Fusion: Practice and Applications, (), 245-264. DOI: https://doi.org/10.54216/FPA.210118
    Abdulkadhim, Israa. A., Zainab. , Rawaa.M.aljubouri. JPEG-Resistant DCT Steganography for Secure Communication. Fusion: Practice and Applications , no. (2026): 245-264. DOI: https://doi.org/10.54216/FPA.210118
    Abdulkadhim, I. , A., Z. , , R. (2026) . JPEG-Resistant DCT Steganography for Secure Communication. Fusion: Practice and Applications , () , 245-264 . DOI: https://doi.org/10.54216/FPA.210118
    Abdulkadhim I. , A. Z. , R. [2026]. JPEG-Resistant DCT Steganography for Secure Communication. Fusion: Practice and Applications. (): 245-264. DOI: https://doi.org/10.54216/FPA.210118
    Abdulkadhim, I. A., Z. , R. "JPEG-Resistant DCT Steganography for Secure Communication," Fusion: Practice and Applications, vol. , no. , pp. 245-264, 2026. DOI: https://doi.org/10.54216/FPA.210118