Analysis of Data Hiding Detection Methods Used in Steganalysis
Abstract
Purpose: To analyze the methods of detecting hidden data used in steganalysis.
Method: Analytical method.
Findings: A systematic analysis of modern methods for detecting hidden information in digital containers, particularly in images, audio, and video files, has been conducted. It has been established that steganalysis is a critically important component of information security, especially in the context of pervasive digital monitoring, cyber espionage, and the spread of unauthorized data exchange.
Theoretical implications: It involves the systematization and classification of modern steganalysis methods, as well as the identification of their strengths and weaknesses. The review of classical and contemporary approaches enables the formation of a comprehensive understanding of the development direction of steganography and its detection tools. The study expands scientific knowledge of the relationship between carrier types, characteristics of hiding algorithms, and the effectiveness of analysis methods.
Value: It lies in the ability to adapt the results to enhance the level of cybersecurity in organizations that handle confidential information. The described methods can be utilized both by information security specialists and by developers of cyber threat detection systems. The application of a combined approach that integrates statistical, signature-based, and machine learning algorithms allows for a significant improvement in the accuracy of detecting hidden data in digital environments.
Future research: In the course of further research, it is advisable to develop a method to reduce revealing features during steganographic protection of the message.
Downloads
References
ESET. (2025). Steganography. ESET Glossary. Available from : https://help.eset.com/glossary/uk-UA/steganography.html.
Kuznetsov, O. O., Yevseiev, S. P., & Korol, O. H. (2011). Steganography: Textbook. KhNEU [Kharkiv National University of Economics].
Konakhovych, H. F., & Puzirenko, A. Yu. (2006). Computer steganography: Theory and practice. MK-Press.
Svitlovskyi, Ye., & Trapezon, K. (2023). Steganographic approaches to audio signal processing. Visnyk KrNU imeni Mykhaila Ostrohradskoho, 3(140), 185–192. Available from : https://visnikkrnu.kdu.edu.ua/statti/2023_3_2023_3_185.pdf.
Koroliov, V. Yu., Polinovskyi, V. V., Herasymenko, V. A., & Gorinshtein, M. L. (2011). Planning research of steganography and steganalysis methods. Visnyk Khmelnytskoho natsionalnoho universytetu, 4, 187–196. Available from : https://journals.khnu.km.ua/vestnik/pdf/tech/2011_4/53kor.pdf.
Encyclopedia of Modern Ukraine. (2014). Cryptography. Available from : https://esu.com.ua/article-1576.
Yudin, O. K., Ziubina, R. V., & Frolov, O. V. (2015). Analysis of steganographic methods for hiding information flows in containers of various formats. Radioelektronika ta Informatyka, 3, 13–21.
Kazmidi, I. D., & Zubok, V. Yu. (2025). Current state of steganography of digital images. In Theoretical and Applied Cybersecurity: Proceedings of the Third All-Ukrainian Scientific and Practical Conference (TACS-2025). Kyiv: KPI im. Ihoria Sikorskoho [Igor Sikorsky Kyiv Polytechnic Institute].
Abstract views: 12 PDF Downloads: 3
Copyright (c) 2025 Kostiantyn Semibalamut, Volodymyr Moldovan, Serhii Stefantsev

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).