Analysis of Data Hiding Detection Methods Used in Steganalysis

Keywords: information security, steganography, steganalysis, digital containers, LSB-method, information hiding

Abstract

Purpose: To analyze the methods of detecting hidden data used in steganalysis.

Method: Analytical method.

Findings: A systematic analysis of modern methods for detecting hidden information in digital containers, particularly in images, audio, and video files, has been conducted. It has been established that steganalysis is a critically important component of information security, especially in the context of pervasive digital monitoring, cyber espionage, and the spread of unauthorized data exchange.

Theoretical implications: It involves the systematization and classification of modern steganalysis methods, as well as the identification of their strengths and weaknesses. The review of classical and contemporary approaches enables the formation of a comprehensive understanding of the development direction of steganography and its detection tools. The study expands scientific knowledge of the relationship between carrier types, characteristics of hiding algorithms, and the effectiveness of analysis methods.

Value: It lies in the ability to adapt the results to enhance the level of cybersecurity in organizations that handle confidential information. The described methods can be utilized both by information security specialists and by developers of cyber threat detection systems. The application of a combined approach that integrates statistical, signature-based, and machine learning algorithms allows for a significant improvement in the accuracy of detecting hidden data in digital environments.

Future research: In the course of further research, it is advisable to develop a method to reduce revealing features during steganographic protection of the message.

Downloads

Download data is not yet available.

References

ESET. (2025). Steganography. ESET Glossary. Available from : https://help.eset.com/glossary/uk-UA/steganography.html.

Kuznetsov, O. O., Yevseiev, S. P., & Korol, O. H. (2011). Steganography: Textbook. KhNEU [Kharkiv National University of Economics].

Konakhovych, H. F., & Puzirenko, A. Yu. (2006). Computer steganography: Theory and practice. MK-Press.

Svitlovskyi, Ye., & Trapezon, K. (2023). Steganographic approaches to audio signal processing. Visnyk KrNU imeni Mykhaila Ostrohradskoho, 3(140), 185–192. Available from : https://visnikkrnu.kdu.edu.ua/statti/2023_3_2023_3_185.pdf.

Koroliov, V. Yu., Polinovskyi, V. V., Herasymenko, V. A., & Gorinshtein, M. L. (2011). Planning research of steganography and steganalysis methods. Visnyk Khmelnytskoho natsionalnoho universytetu, 4, 187–196. Available from : https://journals.khnu.km.ua/vestnik/pdf/tech/2011_4/53kor.pdf.

Encyclopedia of Modern Ukraine. (2014). Cryptography. Available from : https://esu.com.ua/article-1576.

Yudin, O. K., Ziubina, R. V., & Frolov, O. V. (2015). Analysis of steganographic methods for hiding information flows in containers of various formats. Radioelektronika ta Informatyka, 3, 13–21.

Kazmidi, I. D., & Zubok, V. Yu. (2025). Current state of steganography of digital images. In Theoretical and Applied Cybersecurity: Proceedings of the Third All-Ukrainian Scientific and Practical Conference (TACS-2025). Kyiv: KPI im. Ihoria Sikorskoho [Igor Sikorsky Kyiv Polytechnic Institute].


Abstract views: 12
PDF Downloads: 3
Published
2025-06-30
How to Cite
Semibalamut, K., Moldovan, V., & Stefantsev, S. (2025). Analysis of Data Hiding Detection Methods Used in Steganalysis. Social Development and Security, 15(3), 215-222. https://doi.org/10.33445/sds.2025.15.3.19
Section
Engineering and Technology