Comparative Analysis Chi-Square and Histogram Methods for Video Steganography Detection

Authors

  • Alfira Yuniar Rusman Putri Universitas Amikom Yogyakarta
  • Senie Destya Universitas Amikom Yogyakarta
  • Miko Kastomo Putro Universitas Amikom Yogyakarta

DOI:

https://doi.org/10.30871/jaic.v10i2.12115

Keywords:

Video Steganografi, Discrete Cosine Transform, Quantization Index Modulation, Chi – Square Attack, Histogram Analisys

Abstract

The quick increase in using videos to share data makes it easier for secret messages to be hidden using steganography. Even though many methods have been made to find these hidden messages, they aren't well tested when it comes to hiding messages in videos using the frequency domain. This study compares two methods, Chi-Square Attack and Histogram Analysis, to detect hidden messages in videos that use Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM). MP4 videos are broken into PNG frames, and secret messages are hidden in the mid-frequency DCT parts of the video. The amount of hidden data varies at 0.5%, 2.0%, and 5.0%. The quality of the video after hiding messages is checked using PSNR, SSIM, and Bit Error Rate (BER). The ability of the detection methods to find hidden messages is measured by how accurate they are and how long they take to process. The tests are done on five frames taken from one video without re-compressing it. The research results show that the DCT-QIM method produces very good stego quality with PSNR values consistently above 52 dB and SSIM values ranging from 0.9989 to 0.9999. However, the steganalysis results show that the Chi-Square method only achieved a detection accuracy of 30%, while the Histogram method reached an accuracy of 50%. Paired tests show there's a big difference between the two methods (p < 0.05), even though the overall detection performance is still not very good. These results show that the DCT-QIM-based insertion is fairly resistant to traditional statistical detection methods in controlled testing scenarios.

Downloads

Download data is not yet available.

References

[1] Ms. Halima Abbas Ahmed, “Comprehensive Review of Cryptography and Steganography Algorithms,” J. Inf. Syst. Eng. Manag., vol. 10, no. 29s, pp. 211–228, Mar. 2025, doi: 10.52783/jisem.v10i29s.4471.

[2] F. Şahin, T. Çevik, and M. Takaoğlu, “Review of the Literature on the Steganography Concept,” Int. J. Comput. Appl., vol. 183, no. 2, pp. 38–46, May 2021, doi: 10.5120/ijca2021921298.

[3] J. Kunhoth, N. Subramanian, S. Al-Maadeed, and A. Bouridane, “Video steganography: recent advances and challenges,” Multimed. Tools Appl., vol. 82, no. 27, pp. 41943–41985, Nov. 2023, doi: 10.1007/s11042-023-14844-w.

[4] S. N. Alrekaby, M. A. A. Khodher, L. K. Adday, and R. Aljuaidi, “Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography,” Algorithms, vol. 18, no. 7, p. 406, Jul. 2025, doi: 10.3390/a18070406.

[5] Y. Yang, X. Xiang, J. Qin, Y. Tan, Z. Wang, and Y. Liu, “High-Embedded Low-Distortion Multihistogram Shift Video Reversible Data Hiding Based on DCT Coefficient,” Electronics, vol. 12, no. 7, p. 1652, Mar. 2023, doi: 10.3390/electronics12071652.

[6] B. N. Babar, S. Javir, R. Harer, P. Nagwade, and A. Gade, “Video Steganography Using DCT Algorithm,” vol. 11, no. 1, 2024.

[7] A. S. Pratama and I. M. Suartana, “Analisis Kualitas Stego Video dalam Penyisipan Data Memanfaatkan Metode DCT-DWT,” J. Inf. Eng. Educ. Technol., vol. 5, no. 1, pp. 13–18, Jun. 2021, doi: 10.26740/jieet.v5n1.p13-18.

[8] Y. Huang, Z. Liu, Q. Wu, and X. Liu, “Robust image steganography against JPEG compression based on DCT residual modulation,” Signal Process., vol. 219, p. 109431, Jun. 2024, doi: 10.1016/j.sigpro.2024.109431.

[9] R. Patel, K. Lad, and M. Patel, “Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis,” Int. J. Inf. Technol., vol. 14, no. 3, pp. 1649–1657, May 2022, doi: 10.1007/s41870-021-00788-7.

[10] A. Mohamed Abdi̇Rashi̇D, S. Solak, and A. K. Sahu, “Frekans Alanı Görüntü Steganografisine Dayalı Veri Gizleme,” Eur. J. Sci. Technol., Oct. 2022, doi: 10.31590/ejosat.1188597.

[11] D. Yanti, Y. B. Utomo, and H. Mukminna, “Implementation of Steganalysis Technique Using Chi Square Attack Method on Android-Based JPEG Stego Image Format,” JTECS J. Sist. Telekomun. Elektron. Sist. Kontrol Power Sist. Dan Komput., vol. 1, no. 1, p. 51, Jan. 2021, doi: 10.32503/jtecs.v1i1.661.

[12] M. Fuad, F. Ernawan, and L. J. Hui, “Video scene change detection based on histogram analysis for hiding message,” J. Phys. Conf. Ser., vol. 1918, no. 4, p. 042141, Jun. 2021, doi: 10.1088/1742-6596/1918/4/042141.

[13] E. Daraghmi and A. Hamoudi, “From Cryptography to Steganography: Detecting Hidden Data in the Digital World,” Int. J. Innov. Sci. Res. Technol. IJISRT, pp. 1908–1914, Oct. 2024, doi: 10.38124/ijisrt/IJISRT24SEP937.

[14] S. Kapoor and S. Shivani, “Robust and high capacity image steganography technique using spiral-walk inter-block DCT coefficient differencing,” Multimed. Tools Appl., vol. 83, no. 39, pp. 86405–86424, Jun. 2024, doi: 10.1007/s11042-024-19520-1.

[15] T. Wang et al., “Lossless image steganography: Regard steganography as super-resolution,” Inf. Process. Manag., vol. 61, no. 4, p. 103719, Jul. 2024, doi: 10.1016/j.ipm.2024.103719.

[16] F. Ernawan, “An improved hiding information by modifying selected DWT coefficients in video steganography,” Multimed. Tools Appl., vol. 83, no. 12, pp. 34629–34645, Sep. 2023, doi: 10.1007/s11042-023-17113-y.

[17] I. A. Saputro, F. S. Nugraha, L. Sugiarto, and I. A. Prabowo, “Evaluating Steganography Detection in JPEG Images Using Gaussian Mixture Model and Cryptographic Keys,” J. RESTI Rekayasa Sist. Dan Teknol. Inf., vol. 9, no. 6, pp. 1398–1404, Dec. 2025, doi: 10.29207/resti.v9i6.6084.

[18] S. Roy and J. Howlader, “Design and Analysis of a Novel Video Steganography Technique with Enhanced Resilience,” J. Inst. Eng. India Ser. B, Aug. 2025, doi: 10.1007/s40031-025-01260-x.

[19] Y. B. Utomo and H. Mukminna, “Penerapan Teknik Steganalysis Menggunakan Metode Chi Square Attack Pada Stego Image Berformat Jpeg Berbasis Android,” 2021.

Downloads

Published

2026-04-20

How to Cite

[1]
A. Y. Rusman Putri, S. Destya, and M. K. Putro, “Comparative Analysis Chi-Square and Histogram Methods for Video Steganography Detection”, JAIC, vol. 10, no. 2, pp. 1614–1621, Apr. 2026.

Similar Articles

<< < 9 10 11 

You may also start an advanced similarity search for this article.