Comparative Performance Analysis of Several Python Libraries Utilizing the Least Significant Bit Method
DOI:
https://doi.org/10.15575/join.v11i1.1688Keywords:
Discrete Cosine Transform, Image steganography, Least Significant Bit , Peak Signal-to-Noise Ratio , Python libraries, Structural Similarity Index MeasureAbstract
References
[1] J. A. Mazumder and K. Hemachandran, “Study of Image Steganography using LSB, DFT and DWT,” Int J Comput Technol, vol. 11, pp. 2618–2627, 2013.
[2] S. K. Behera and M. Mishra, “Steganography--A Game of Hide and Seek in Information Communication,” arXiv preprint arXiv:1604.00493, 2016.
[3] S. Rahman et al., “A novel and efficient digital image steganography technique using least significant bit substitution,” Sci. Rep., vol. 15, no. 1, p. 107, 2025.
[4] A. K. Sahu and M. Sahu, “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, vol. 10, no. 1, pp. 296–342, 2020.
[5] A. Lavanya, S. Sindhuja, L. Gaurav, and W. Ali, “A Comprehensive Review of Data Visualization Tools: Features,” Strengths, and Weaknesses, 2023.
[6] D. R. I. M. Setiadi, S. Rustad, P. N. Andono, and G. F. Shidik, “Digital Image Steganography Survey and Investigation (Goal, Assessment, Method, Development, and Dataset),” Signal Processing, vol. 206, p. 108908, 2023, doi: 10.1016/j.sigpro.2022.108908.
[7] R. R. Asaad, R. I. Ali, Z. A. Ali, and A. A. Shaaban, “Image processing with Python libraries,” Academic Journal of Nawroz University (AJNU), vol. 12, no. 2, 2023.
[8] D. Raghuvanshi, K. Joshi, R. Nandal, S. Singh, and D. Kumari, “Advancing image steganography: PRISMA-ScR based analysis of spatial domain techniques,” Multimed. Tools Appl., vol. 84, no. 40, pp. 48475–48509, 2025, doi: 10.1007/s11042-025-21040-5.
[9] G. Li, S. Li, Z. Qian, and X. Zhang, Cover-separable Fixed Neural Network Steganography via Deep Generative Models, vol. 1, no. 1. Association for Computing Machinery, 2024. doi: 10.1145/3664647.3680824.
[10] R.-G. Zhou, J. Luo, X. Liu, C. Zhu, L. Wei, and X. Zhang, “A Novel Quantum Image Steganography Scheme Based on LSB,” International Journal of Theoretical Physics, vol. 57, no. 6, pp. 1848–1863, 2018, doi: 10.1007/s10773-018-3710-x.
[11] Y. JinaChanu, Kh. Manglem Singh, and T. Tuithung, “Image Steganography and Steganalysis: A Survey,” Int. J. Comput. Appl., vol. 52, no. 2, pp. 1–11, 2012, doi: 10.5120/8171-1484.
[12] X. Zhang, F. Peng, and M. Long, “Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,” IEEE Trans. Multimedia, vol. 20, no. 12, pp. 3223–3238, 2018, doi: 10.1109/TMM.2018.2838334.
[13] K. Zeng, K. Chen, W. Zhang, Y. Wang, and N. Yu, “Improving robust adaptive steganography via minimizing channel errors,” Signal Processing, vol. 195, p. 108498, 2022, doi: 10.1016/j.sigpro.2022.108498.
[14] A. Munshi, “Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography,” Engineering, Technology and Applied Science Research, vol. 13, no. 3, pp. 10922–10930, 2023, doi: 10.48084/etasr.5935.
[15] D. R. I. M. Setiadi, “PSNR vs SSIM: imperceptibility quality assessment for image steganography,” Multimed. Tools Appl., vol. 80, no. 6, pp. 8423–8444, 2021, doi: 10.1007/s11042-020-10035-z.
[16] Y. M. Younis, R. J. Mstafa, and S. AL-Dohuki, “AttenHideNet: A novel deep learning-based image steganography method using a lightweight U-net with soft attention,” Appl. Soft Comput., vol. 182, no. February, p. 113583, 2025, doi: 10.1016/j.asoc.2025.113583.
[17] D. A. Shehab and M. J. Alhaddad, “SS symmetry Comprehensive Survey of Multimedia Steganalysis :,” Symmetry 2022, MDPI, vol. 14, no. 117, pp. 1–26, 2022.
[18] S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh, “SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images,” Measurement (Lond)., vol. 139, pp. 426–437, 2019, doi: 10.1016/j.measurement.2019.02.069.
[19] V. Himthani, V. S. Dhaka, M. Kaur, G. Rani, M. Oza, and H. N. Lee, “Comparative performance assessment of deep learning based image steganography techniques,” Sci. Rep., vol. 12, no. 1, pp. 1–16, 2022, doi: 10.1038/s41598-022-17362-1.
[20] F. Li, L. Li, Y. Zeng, J. Yu, and C. Qin, “Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement,” Multimed. Tools Appl., vol. 84, no. 9, pp. 5793–5823, 2025, doi: 10.1007/s11042-024-18920-7.
[21] P. Fan, H. Zhang, and X. Zhao, “Robust video steganography for social media sharing based on principal component analysis,” EURASIP J. Inf. Secur., vol. 2022, no. 1, 2022, doi: 10.1186/s13635-022-00130-z.
[22] R. Apau, M. Asante, F. Twum, J. Ben Hayfron-Acquah, and K. O. Peasah, Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review, vol. 19, no. 9 September. 2024. doi: 10.1371/journal.pone.0308807.
[23] Y. Sanjalawe, S. Al-E’mari, S. Fraihat, M. Abualhaj, and E. Alzubi, “A deep learning-driven multi-layered steganographic approach for enhanced data security,” Sci. Rep., vol. 15, no. 1, pp. 1–30, 2025, doi: 10.1038/s41598-025-89189-5.
[24] M. Taleby Ahvanooey, Q. Li, J. Hou, H. Dana Mazraeh, and J. Zhang, “AITSteg: An innovative text steganography technique for hidden transmission of text message via social media,” IEEE Access, vol. 6, pp. 65981–65995, 2018, doi: 10.1109/ACCESS.2018.2866063.
[25] A. Mohammadi, “A general framework for reversible data hiding in encrypted images by reserving room before encryption,” J. Vis. Commun. Image Represent., vol. 85, no. December 2021, p. 103478, 2022, doi: 10.1016/j.jvcir.2022.103478.
[26] R. S. Hameed, S. S. Mokri, M. S. Taha, and M. M. Taher, “High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, pp. 108–115, 2022, doi: 10.14569/IJACSA.2022.0130814.
[27] G. Gao, L. Zhang, Y. Lin, S. Tong, and C. Yuan, “High-performance reversible data hiding in encrypted images with adaptive Huffman code,” Digital Signal Processing: A Review Journal, vol. 133, p. 103870, 2023, doi: 10.1016/j.dsp.2022.103870.
[28] S. Ahmad, J. O. Ogala, F. Ikpotokin, M. Arif, J. Ahmad, and S. Mehfuz, “Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud,” SN Comput. Sci., vol. 5, no. 4, 2024, doi: 10.1007/s42979-024-02756-x.
[29] Y. Peng, C. Fu, Y. Zheng, Y. Tian, G. Cao, and J. Chen, “Medical steganography: Enhanced security and image quality, and new S-Q assessment,” Signal Processing, vol. 223, no. May, p. 109546, 2024, doi: 10.1016/j.sigpro.2024.109546.
[30] W. Rehman, “A Novel Approach to Image Steganography Using Generative Adversarial Networks,” pp. 1–17, 2024, [Online]. Available: http://arxiv.org/abs/2412.00094
[31] N. N. Kumar, R. Viswanathan, and P. S. Kumar, “An Efficient Approach on Image Encryption Steganography based on 2D SWT with Chaotic Techniques,” in 2024 4th International Conference on Soft Computing for Security Applications (ICSCSA), 2024, pp. 479–486. doi: 10.1109/ICSCSA64454.2024.00083.
[32] S. Agha, F. Jan, H. A. Khan, M. Kaleem, and M. Khan, Efficient motion estimation and discrete cosine transform implementation using the graphics processing units, vol. 19, no. 8. 2024. doi: 10.1371/journal.pone.0307217.
[33] L. Widyawati, I. Riadi, and Y. Prayudi, “Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm,” MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 20, no. 1, pp. 169–182, 2020, doi: 10.30812/matrik.v20i1.701.
[34] W. Tang, B. Li, M. Barni, J. Li, and J. Huang, “Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 6, pp. 4081–4095, 2022, doi: 10.1109/TCSVT.2021.3115600.
[35] B. A. Y. Alqaralleh, T. Vaiyapuri, V. S. Parvathy, D. Gupta, A. Khanna, and K. Shankar, “Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment,” Pers. Ubiquitous Comput., vol. 28, no. 1, pp. 17–27, 2024, doi: 10.1007/s00779-021-01543-2.
[36] M. Xu and Y. Lin, “FedSteg: Coverless Steganography‐Based Privacy‐Preserving Decentralized Federated Learning,” Ieej Transactions on Electrical and Electronic Engineering, vol. 19, no. 8, pp. 1345–1359, 2024, doi: 10.1002/tee.24085.
[37] E. Kuchumova, S. M. M. Monterrubio, and J. A. Recio-García, “STEG-XAI: explainable steganalysis in images using neural networks.,” Multim. Tools Appl., vol. 83, no. 17, pp. 50601–50618, 2024, doi: 10.1007/S11042-023-17483-3.
[38] G. Han, D. J. Lee, J. Hur, J. Choi, and J. Kim, “Deep Cross-Modal Steganography Using Neural Representations,” Proceedings - International Conference on Image Processing, ICIP, pp. 1205–1209, 2023, doi: 10.1109/ICIP49359.2023.10222113.
[39] N. Farooq and A. K. Selwal, “Image steganalysis using deep learning: a systematic review and open research challenges,” J. Ambient Intell. Humaniz. Comput., vol. 14, pp. 7761–7793, 2023, [Online]. Available: https://api.semanticscholar.org/CorpusID:257883581
[40] J. Ye, J. Ni, and Y. Yi, “Deep Learning Hierarchical Representations for Image Steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2545–2557, 2017, doi: 10.1109/TIFS.2017.2710946.
[41] X. Mo, S. Tan, B. Li, and J. Huang, “MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4306–4320, 2021, doi: 10.1109/TIFS.2021.3104140.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2026 Saepudin Nirwan, Rolly Maulana Awangga, Naufal Fachrudin Nirwan

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License








