ANALYSIS OF THE RESISTANCE OF STEGANOALGORITHMS TO GEOMETRIC ATTACKS AND COMPRESSION
DOI: 10.31673/2409-7292.2025.020965
DOI:
https://doi.org/10.31673/2409-7292.2025.020965Abstract
The analysis of the stability of steganographic methods of hiding in the spatial domain to attacks common in open and
closed channels, such as geometric transformations and compression, was carried out. The impact of these attacks on the stability
of the steganochannel operation was assessed and methods for increasing the stability to such attacks were proposed. Various
types of attacks based on affine transformations and their impact on the quality of information hiding were investigated.
Attention was focused on preserving the integrity of the message during such attacks.
The study evaluates the possibility of using different types of messages and the impact of coding with repetition on the
stability of the steganosystem. A method for assessing the stability of attacks based on the bit error method was developed and
simulated, which was modified for analysis at the byte level in order to apply the results to different types of containers and
support streaming data.
The importance of the absence of the influence of the order of pixel placement when embedding a message is noted,
which allows minimizing the impact of geometric transformations on the embedded message. The resistance of the color space
modification algorithm to attacks is higher than that of the LSB method by 14-98%. LSB has a 10% higher resistance only to a
minor scaling attack. However, this difference does not allow us to call it practically suitable for use.
The influence of image resolution on the amount of embedded information in each of the methods is analyzed. Promising
directions for further research are analyzed by introducing block coding and using effective error correction methods and using
alternative container properties for embedding.
Keywords: steganography, geometric attacks, affine transformations, color space.
References
1. Kalenyuk, P., Rybytska, O., & Ivasyk, G. (2019). Linear algebra and analytic geometry: Basic course: Tutorial
[Лінійна алгебра та аналітична геометрія. Базовий курс] (J. Wojtowicz, Trans.). Lviv Polytechnic Publishing House.
2. Walia, Ekta & Jain, Payal & Navdeep. (2010). An analysis of LSB & DCT based steganography. Global
Journal of Computer Science and Technology. 10.
3. Zhang, Y., Luo, X., Wang, J., Yang, C., & Liu, F. (2018). A robust image steganography method resistant to
scaling and detection. Journal of Internet Technology, 19(2), 607–618. https://doi.org/10.3966/1607926420180319-
02029.
4. Apau, R., Asante, M., Twum, F., Ben Hayfron-Acquah, J., & Peasah, K. O. (2024). Image steganography
techniques for resisting statistical steganalysis attacks: A systematic literature review. PloS one, 19(9), e0308807.
https://doi.org/10.1371/journal.pone.0308807.
5. Alrusaini, O. A. (2025). Deep learning for steganalysis: Evaluating model robustness against image
transformations. Frontiers in Artificial Intelligence, 8, 1532895. https://doi.org/10.3389/frai.2025.1532895.
6. AbdelRaouf, A. (2021). A new data hiding approach for image steganography based on visual color sensitivity.
Multimedia Tools and Applications, 80. https://doi.org/10.1007/s11042-020-10224-w.
7. Margalikas, E., & Ramanauskaitė, S. (2019). Image steganography based on color palette transformation in
color space. EURASIP Journal on Image and Video Processing, 2019(1). https://doi.org/10.1186/s13640-019-0484-x.
8. Гасілін Д., Журавель І. (2024) Стеганографічний метод приховування інформації через модифікацію
колірного простору з урахуванням властивостей зорового сприйняття. Інформаційні технології і автоматизація –
2024 : матеріали XVII Міжнародної науково-практичної конференції, Одеса, 31 жовтня – 1 листопада 2024 р. –
2024. – C. 175–178.
9. Virtanen, P., Gommers, R., Oliphant, T. E., Haberland, M., Reddy, T., Cournapeau, D., Burovski, E., Peterson,
P., Weckesser, W., Bright, J., van der Walt, S. J., Brett, M., Wilson, J., Millman, K. J., Mayorov, N., Nelson, A. R. J.,
Jones, E., Kern, R., Larson, E., Carey, C. J., Polat, İ., Feng, Y., Moore, E. W., VanderPlas, J., Laxalde, D., Perktold, J.,
Cimrman, R., Henriksen, I., Quintero, E. A., Harris, C. R., Archibald, A. M., Ribeiro, A. H., Pedregosa, F., van Mulbregt,
P., & SciPy 1.0 Contributors. (2020). SciPy 1.0: Fundamental algorithms for scientific computing in Python. Nature
Methods, 17(3), 261–272. https://doi.org/10.1038/s41592-019-0686-2.
10. Harris, C. R., Millman, K. J., van der Walt, S. J., et al. (2020). Array programming with NumPy. Nature, 585,
357–362. https://doi.org/10.1038/s41586-020-2649-2.
11. The Pandas Development Team. (2024). pandas-dev/pandas: Pandas (v2.2.3). Zenodo.
https://doi.org/10.5281/zenodo.13819579.
12. Bradski, G. (2000). The OpenCV library. Dr. Dobb’s Journal of Software Tools.
13. Clark, A. (2015). Pillow (PIL fork) documentation. Read the Docs. Retrieved from
https://pillow.readthedocs.io/.
14. Malluri, S. (2021). Image Steganography. GitHub. https://github.com/LudicrousWhale/ImageSteganography.
15. Shah, M., Yu, X., Di, S., Becchi, M., & Cappello, F. (2024). A portable, fast, DCT-based compressor for AI
accelerators. In Proceedings of the 33rd International Symposium on High-Performance Parallel and Distributed
Computing (pp. 109–121). Association for Computing Machinery. https://doi.org/10.1145/3625549.3658662.
16. Kunhoth, Jayakanth & Subramanian, Nandhini & Al-ma'adeed, Somaya & Bouridane, Ahmed. (2023). Video
steganography: recent advances and challenges. Multimedia Tools and Applications. 82. 1-43.
https://doi.org/10.1007/s11042-023-14844-w.
17. Brakensiek, J., Gopi, S., & Makam, V. (2023). Generic Reed-Solomon codes achieve list-decoding capacity.
In Proceedings of the 55th Annual ACM Symposium on Theory of Computing (pp. 1488–1501). Association for
Computing Machinery. https://doi.org/10.1145/3564246.3585128.
18. McKiernan, S. (2023). Foundational Techniques for Wireless Communications: Channel Coding, Modulation,
and Equalization. ArXiv. https://arxiv.org/abs/2310.13209.
19. Yergeau, F. (2003, November). UTF-8, a transformation format of ISO 10646. https://www.rfceditor.org/info/rfc3629.