Comparative Analysis Chi-Square and Histogram Methods for Video Steganography Detection
DOI:
https://doi.org/10.30871/jaic.v10i2.12115Keywords:
Video Steganografi, Discrete Cosine Transform, Quantization Index Modulation, Chi – Square Attack, Histogram AnalisysAbstract
The quick increase in using videos to share data makes it easier for secret messages to be hidden using steganography. Even though many methods have been made to find these hidden messages, they aren't well tested when it comes to hiding messages in videos using the frequency domain. This study compares two methods, Chi-Square Attack and Histogram Analysis, to detect hidden messages in videos that use Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM). MP4 videos are broken into PNG frames, and secret messages are hidden in the mid-frequency DCT parts of the video. The amount of hidden data varies at 0.5%, 2.0%, and 5.0%. The quality of the video after hiding messages is checked using PSNR, SSIM, and Bit Error Rate (BER). The ability of the detection methods to find hidden messages is measured by how accurate they are and how long they take to process. The tests are done on five frames taken from one video without re-compressing it. The research results show that the DCT-QIM method produces very good stego quality with PSNR values consistently above 52 dB and SSIM values ranging from 0.9989 to 0.9999. However, the steganalysis results show that the Chi-Square method only achieved a detection accuracy of 30%, while the Histogram method reached an accuracy of 50%. Paired tests show there's a big difference between the two methods (p < 0.05), even though the overall detection performance is still not very good. These results show that the DCT-QIM-based insertion is fairly resistant to traditional statistical detection methods in controlled testing scenarios.
Downloads
References
[1] Ms. Halima Abbas Ahmed, “Comprehensive Review of Cryptography and Steganography Algorithms,” J. Inf. Syst. Eng. Manag., vol. 10, no. 29s, pp. 211–228, Mar. 2025, doi: 10.52783/jisem.v10i29s.4471.
[2] F. Şahin, T. Çevik, and M. Takaoğlu, “Review of the Literature on the Steganography Concept,” Int. J. Comput. Appl., vol. 183, no. 2, pp. 38–46, May 2021, doi: 10.5120/ijca2021921298.
[3] J. Kunhoth, N. Subramanian, S. Al-Maadeed, and A. Bouridane, “Video steganography: recent advances and challenges,” Multimed. Tools Appl., vol. 82, no. 27, pp. 41943–41985, Nov. 2023, doi: 10.1007/s11042-023-14844-w.
[4] S. N. Alrekaby, M. A. A. Khodher, L. K. Adday, and R. Aljuaidi, “Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography,” Algorithms, vol. 18, no. 7, p. 406, Jul. 2025, doi: 10.3390/a18070406.
[5] Y. Yang, X. Xiang, J. Qin, Y. Tan, Z. Wang, and Y. Liu, “High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient,” Electronics, vol. 12, no. 7, p. 1652, Mar. 2023, doi: 10.3390/electronics12071652.
[6] B. N. Babar, S. Javir, R. Harer, P. Nagwade, and A. Gade, “Video Steganography Using DCT Algorithm,” vol. 11, no. 1, 2024.
[7] A. S. Pratama and I. M. Suartana, “Analisis Kualitas Stego Video dalam Penyisipan Data Memanfaatkan Metode DCT-DWT,” J. Inf. Eng. Educ. Technol., vol. 5, no. 1, pp. 13–18, Jun. 2021, doi: 10.26740/jieet.v5n1.p13-18.
[8] Y. Huang, Z. Liu, Q. Wu, and X. Liu, “Robust image steganography against JPEG compression based on DCT residual modulation,” Signal Process., vol. 219, p. 109431, Jun. 2024, doi: 10.1016/j.sigpro.2024.109431.
[9] R. Patel, K. Lad, and M. Patel, “Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis,” Int. J. Inf. Technol., vol. 14, no. 3, pp. 1649–1657, May 2022, doi: 10.1007/s41870-021-00788-7.
[10] A. Mohamed Abdi̇Rashi̇D, S. Solak, and A. K. Sahu, “Frekans Alanı Görüntü Steganografisine Dayalı Veri Gizleme,” Eur. J. Sci. Technol., Oct. 2022, doi: 10.31590/ejosat.1188597.
[11] D. Yanti, Y. B. Utomo, and H. Mukminna, “Implementation of Steganalysis Technique Using Chi Square Attack Method on Android-Based JPEG Stego Image Format,” JTECS J. Sist. Telekomun. Elektron. Sist. Kontrol Power Sist. Dan Komput., vol. 1, no. 1, p. 51, Jan. 2021, doi: 10.32503/jtecs.v1i1.661.
[12] M. Fuad, F. Ernawan, and L. J. Hui, “Video scene change detection based on histogram analysis for hiding message,” J. Phys. Conf. Ser., vol. 1918, no. 4, p. 042141, Jun. 2021, doi: 10.1088/1742-6596/1918/4/042141.
[13] E. Daraghmi and A. Hamoudi, “From Cryptography to Steganography: Detecting Hidden Data in the Digital World,” Int. J. Innov. Sci. Res. Technol. IJISRT, pp. 1908–1914, Oct. 2024, doi: 10.38124/ijisrt/IJISRT24SEP937.
[14] S. Kapoor and S. Shivani, “Robust and high capacity image steganography technique using spiral-walk inter-block DCT coefficient differencing,” Multimed. Tools Appl., vol. 83, no. 39, pp. 86405–86424, Jun. 2024, doi: 10.1007/s11042-024-19520-1.
[15] T. Wang et al., “Lossless image steganography: Regard steganography as super-resolution,” Inf. Process. Manag., vol. 61, no. 4, p. 103719, Jul. 2024, doi: 10.1016/j.ipm.2024.103719.
[16] F. Ernawan, “An improved hiding information by modifying selected DWT coefficients in video steganography,” Multimed. Tools Appl., vol. 83, no. 12, pp. 34629–34645, Sep. 2023, doi: 10.1007/s11042-023-17113-y.
[17] I. A. Saputro, F. S. Nugraha, L. Sugiarto, and I. A. Prabowo, “Evaluating Steganography Detection in JPEG Images Using Gaussian Mixture Model and Cryptographic Keys,” J. RESTI Rekayasa Sist. Dan Teknol. Inf., vol. 9, no. 6, pp. 1398–1404, Dec. 2025, doi: 10.29207/resti.v9i6.6084.
[18] S. Roy and J. Howlader, “Design and Analysis of a Novel Video Steganography Technique with Enhanced Resilience,” J. Inst. Eng. India Ser. B, Aug. 2025, doi: 10.1007/s40031-025-01260-x.
[19] Y. B. Utomo and H. Mukminna, “Penerapan Teknik Steganalysis Menggunakan Metode Chi Square Attack Pada Stego Image Berformat Jpeg Berbasis Android,” 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Alfira Yuniar Rusman Putri, Senie Destya, Miko Kastomo Putro

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).








