Comparative Performance Analysis of Several Python Libraries Utilizing the Least Significant Bit Method

Authors

  • Saepudin Nirwan Department of Informatics, Universitas Logistik dan Bisnis Internasional, Indonesia
  • Rolly Maulana Awangga Department of Informatics, Universitas Logistik dan Bisnis Internasional, Indonesia
  • Naufal Fachrudin Nirwan Department of Informatics, Telkom University, Indonesia

DOI:

https://doi.org/10.15575/join.v11i1.1688

Keywords:

Discrete Cosine Transform, Image steganography, Least Significant Bit , Peak Signal-to-Noise Ratio , Python libraries, Structural Similarity Index Measure

Abstract

Steganography serves as a critical information security technique for concealing data within digital media. While the spatial-domain Least Significant Bit (LSB) method is widely adopted due to its embedding effectiveness and straightforward implementation, this study addresses a crucial gap: the lack of implementation-level comparisons of deployable Python LSB libraries utilizing dual-metric evaluation and standardized robustness testing. We present a systematic comparative performance analysis of three distinct Python-based implementations: classical LSB sequential, LSB randomized, and Discrete Cosine Transform (DCT)-based LSB embedding. Image quality and fidelity were rigorously quantified through Peak Signal-to-Noise Ratio (PSNR) and the Structural Similarity Index Measure (SSIM). Under ideal conditions, baseline evaluations demonstrated high imperceptibility across all methods, yielding PSNR values ranging from 43.1 to 48.2 dB and SSIM scores between 0.85 and 0.95. However, standardized robustness testing by encompassing Gaussian noise, spatial cropping, and rotational manipulations exposed significant vulnerabilities. Post-manipulation image quality assessments revealed severe structural degradations, with PSNR values dropping to a range of 6.81 dB to 22.79 dB and SSIM scores falling between 0.6454 and 0.8781, depending on the attack type. Consequently, classical LSB methods exhibited Bit Error Rates (BER) of 44-54% for color images and 45-50% for grayscale images. Notably, the DCT-based method demonstrated superior resilience against geometric transformations, significantly reducing the BER to 25.37% under rotational attacks for grayscale images, compared to 50% for classical LSB. These findings provide vital empirical guidance for selecting appropriate Python implementations based on specific application requirements, effectively balancing embedding capacity, imperceptibility, and robustness against attacks.

Author Biographies

Rolly Maulana Awangga, Department of Informatics, Universitas Logistik dan Bisnis Internasional

Department Staff

Naufal Fachrudin Nirwan, Department of Informatics, Telkom University

Student of Data Science Program

References

[1] J. A. Mazumder and K. Hemachandran, “Study of Image Steganography using LSB, DFT and DWT,” Int J Comput Technol, vol. 11, pp. 2618–2627, 2013.

[2] S. K. Behera and M. Mishra, “Steganography--A Game of Hide and Seek in Information Communication,” arXiv preprint arXiv:1604.00493, 2016.

[3] S. Rahman et al., “A novel and efficient digital image steganography technique using least significant bit substitution,” Sci. Rep., vol. 15, no. 1, p. 107, 2025.

[4] A. K. Sahu and M. Sahu, “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, vol. 10, no. 1, pp. 296–342, 2020.

[5] A. Lavanya, S. Sindhuja, L. Gaurav, and W. Ali, “A Comprehensive Review of Data Visualization Tools: Features,” Strengths, and Weaknesses, 2023.

[6] D. R. I. M. Setiadi, S. Rustad, P. N. Andono, and G. F. Shidik, “Digital Image Steganography Survey and Investigation (Goal, Assessment, Method, Development, and Dataset),” Signal Processing, vol. 206, p. 108908, 2023, doi: 10.1016/j.sigpro.2022.108908.

[7] R. R. Asaad, R. I. Ali, Z. A. Ali, and A. A. Shaaban, “Image processing with Python libraries,” Academic Journal of Nawroz University (AJNU), vol. 12, no. 2, 2023.

[8] D. Raghuvanshi, K. Joshi, R. Nandal, S. Singh, and D. Kumari, “Advancing image steganography: PRISMA-ScR based analysis of spatial domain techniques,” Multimed. Tools Appl., vol. 84, no. 40, pp. 48475–48509, 2025, doi: 10.1007/s11042-025-21040-5.

[9] G. Li, S. Li, Z. Qian, and X. Zhang, Cover-separable Fixed Neural Network Steganography via Deep Generative Models, vol. 1, no. 1. Association for Computing Machinery, 2024. doi: 10.1145/3664647.3680824.

[10] R.-G. Zhou, J. Luo, X. Liu, C. Zhu, L. Wei, and X. Zhang, “A Novel Quantum Image Steganography Scheme Based on LSB,” International Journal of Theoretical Physics, vol. 57, no. 6, pp. 1848–1863, 2018, doi: 10.1007/s10773-018-3710-x.

[11] Y. JinaChanu, Kh. Manglem Singh, and T. Tuithung, “Image Steganography and Steganalysis: A Survey,” Int. J. Comput. Appl., vol. 52, no. 2, pp. 1–11, 2012, doi: 10.5120/8171-1484.

[12] X. Zhang, F. Peng, and M. Long, “Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,” IEEE Trans. Multimedia, vol. 20, no. 12, pp. 3223–3238, 2018, doi: 10.1109/TMM.2018.2838334.

[13] K. Zeng, K. Chen, W. Zhang, Y. Wang, and N. Yu, “Improving robust adaptive steganography via minimizing channel errors,” Signal Processing, vol. 195, p. 108498, 2022, doi: 10.1016/j.sigpro.2022.108498.

[14] A. Munshi, “Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography,” Engineering, Technology and Applied Science Research, vol. 13, no. 3, pp. 10922–10930, 2023, doi: 10.48084/etasr.5935.

[15] D. R. I. M. Setiadi, “PSNR vs SSIM: imperceptibility quality assessment for image steganography,” Multimed. Tools Appl., vol. 80, no. 6, pp. 8423–8444, 2021, doi: 10.1007/s11042-020-10035-z.

[16] Y. M. Younis, R. J. Mstafa, and S. AL-Dohuki, “AttenHideNet: A novel deep learning-based image steganography method using a lightweight U-net with soft attention,” Appl. Soft Comput., vol. 182, no. February, p. 113583, 2025, doi: 10.1016/j.asoc.2025.113583.

[17] D. A. Shehab and M. J. Alhaddad, “SS symmetry Comprehensive Survey of Multimedia Steganalysis :,” Symmetry 2022, MDPI, vol. 14, no. 117, pp. 1–26, 2022.

[18] S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh, “SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images,” Measurement (Lond)., vol. 139, pp. 426–437, 2019, doi: 10.1016/j.measurement.2019.02.069.

[19] V. Himthani, V. S. Dhaka, M. Kaur, G. Rani, M. Oza, and H. N. Lee, “Comparative performance assessment of deep learning based image steganography techniques,” Sci. Rep., vol. 12, no. 1, pp. 1–16, 2022, doi: 10.1038/s41598-022-17362-1.

[20] F. Li, L. Li, Y. Zeng, J. Yu, and C. Qin, “Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement,” Multimed. Tools Appl., vol. 84, no. 9, pp. 5793–5823, 2025, doi: 10.1007/s11042-024-18920-7.

[21] P. Fan, H. Zhang, and X. Zhao, “Robust video steganography for social media sharing based on principal component analysis,” EURASIP J. Inf. Secur., vol. 2022, no. 1, 2022, doi: 10.1186/s13635-022-00130-z.

[22] R. Apau, M. Asante, F. Twum, J. Ben Hayfron-Acquah, and K. O. Peasah, Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review, vol. 19, no. 9 September. 2024. doi: 10.1371/journal.pone.0308807.

[23] Y. Sanjalawe, S. Al-E’mari, S. Fraihat, M. Abualhaj, and E. Alzubi, “A deep learning-driven multi-layered steganographic approach for enhanced data security,” Sci. Rep., vol. 15, no. 1, pp. 1–30, 2025, doi: 10.1038/s41598-025-89189-5.

[24] M. Taleby Ahvanooey, Q. Li, J. Hou, H. Dana Mazraeh, and J. Zhang, “AITSteg: An innovative text steganography technique for hidden transmission of text message via social media,” IEEE Access, vol. 6, pp. 65981–65995, 2018, doi: 10.1109/ACCESS.2018.2866063.

[25] A. Mohammadi, “A general framework for reversible data hiding in encrypted images by reserving room before encryption,” J. Vis. Commun. Image Represent., vol. 85, no. December 2021, p. 103478, 2022, doi: 10.1016/j.jvcir.2022.103478.

[26] R. S. Hameed, S. S. Mokri, M. S. Taha, and M. M. Taher, “High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, pp. 108–115, 2022, doi: 10.14569/IJACSA.2022.0130814.

[27] G. Gao, L. Zhang, Y. Lin, S. Tong, and C. Yuan, “High-performance reversible data hiding in encrypted images with adaptive Huffman code,” Digital Signal Processing: A Review Journal, vol. 133, p. 103870, 2023, doi: 10.1016/j.dsp.2022.103870.

[28] S. Ahmad, J. O. Ogala, F. Ikpotokin, M. Arif, J. Ahmad, and S. Mehfuz, “Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud,” SN Comput. Sci., vol. 5, no. 4, 2024, doi: 10.1007/s42979-024-02756-x.

[29] Y. Peng, C. Fu, Y. Zheng, Y. Tian, G. Cao, and J. Chen, “Medical steganography: Enhanced security and image quality, and new S-Q assessment,” Signal Processing, vol. 223, no. May, p. 109546, 2024, doi: 10.1016/j.sigpro.2024.109546.

[30] W. Rehman, “A Novel Approach to Image Steganography Using Generative Adversarial Networks,” pp. 1–17, 2024, [Online]. Available: http://arxiv.org/abs/2412.00094

[31] N. N. Kumar, R. Viswanathan, and P. S. Kumar, “An Efficient Approach on Image Encryption Steganography based on 2D SWT with Chaotic Techniques,” in 2024 4th International Conference on Soft Computing for Security Applications (ICSCSA), 2024, pp. 479–486. doi: 10.1109/ICSCSA64454.2024.00083.

[32] S. Agha, F. Jan, H. A. Khan, M. Kaleem, and M. Khan, Efficient motion estimation and discrete cosine transform implementation using the graphics processing units, vol. 19, no. 8. 2024. doi: 10.1371/journal.pone.0307217.

[33] L. Widyawati, I. Riadi, and Y. Prayudi, “Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm,” MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 20, no. 1, pp. 169–182, 2020, doi: 10.30812/matrik.v20i1.701.

[34] W. Tang, B. Li, M. Barni, J. Li, and J. Huang, “Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 6, pp. 4081–4095, 2022, doi: 10.1109/TCSVT.2021.3115600.

[35] B. A. Y. Alqaralleh, T. Vaiyapuri, V. S. Parvathy, D. Gupta, A. Khanna, and K. Shankar, “Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment,” Pers. Ubiquitous Comput., vol. 28, no. 1, pp. 17–27, 2024, doi: 10.1007/s00779-021-01543-2.

[36] M. Xu and Y. Lin, “FedSteg: Coverless Steganography‐Based Privacy‐Preserving Decentralized Federated Learning,” Ieej Transactions on Electrical and Electronic Engineering, vol. 19, no. 8, pp. 1345–1359, 2024, doi: 10.1002/tee.24085.

[37] E. Kuchumova, S. M. M. Monterrubio, and J. A. Recio-García, “STEG-XAI: explainable steganalysis in images using neural networks.,” Multim. Tools Appl., vol. 83, no. 17, pp. 50601–50618, 2024, doi: 10.1007/S11042-023-17483-3.

[38] G. Han, D. J. Lee, J. Hur, J. Choi, and J. Kim, “Deep Cross-Modal Steganography Using Neural Representations,” Proceedings - International Conference on Image Processing, ICIP, pp. 1205–1209, 2023, doi: 10.1109/ICIP49359.2023.10222113.

[39] N. Farooq and A. K. Selwal, “Image steganalysis using deep learning: a systematic review and open research challenges,” J. Ambient Intell. Humaniz. Comput., vol. 14, pp. 7761–7793, 2023, [Online]. Available: https://api.semanticscholar.org/CorpusID:257883581

[40] J. Ye, J. Ni, and Y. Yi, “Deep Learning Hierarchical Representations for Image Steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2545–2557, 2017, doi: 10.1109/TIFS.2017.2710946.

[41] X. Mo, S. Tan, B. Li, and J. Huang, “MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4306–4320, 2021, doi: 10.1109/TIFS.2021.3104140.

Downloads

Published

2026-04-30

Issue

Section

Article

Citation Check

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.