Mathematical model of steganography using suboptimal decisions in data compression algorithms
DOI:
https://doi.org/10.17721/ISTS.2025.9.54-60Keywords:
steganography, data compression algorithms, signal processing, data security, decision treesAbstract
Background. Protecting access to information in the digital age requires the development of digital tools to encrypt and hide the information from everyone who is not meant to be able to access it. While encryption is great at preventing unauthorized people from accessing the information, it lets people know that there is something hidden behind the transformation. Steganography instead allows us to obscure the fact of information concealment in the first place. Unfortunately, common types of steganography rely on altering the source signal, leaving subtle footprints of data manipulation that can be traced and detected. The goal of this research paper is to provide a model that has the potential of preserving the source signal in its entirety, instead relying on changing the way the source signal is represented in digital media in a way that allows us to encode secret data into the output stream.
Methods. A theoretical analysis of steganography approaches on data compression algorithms was conducted. Methods of preserving source data stream were investigated.
Results. A new model has been developed that uses decision-making processes in data compression algorithms to encode steganographic data in a resulting data stream. In lossless data compression schemes, it is possible to achieve perfect reproduction of source data stream, making detection through analysis of underlying signal encoded in data compression algorithms useless.
Conclusions. The need for information security has been increasing over time, with tensions between countries resulting in new armed conflicts around the world. The ability to embed and covertly send data through steganography may provide a competitive economic, political, and/or military edge. The developed model can be applied to further develop specific methods of steganographic data encoding that is resilient to analysis and detection by existing approaches that rely on statistical analysis of underlying signal stream.
Downloads
References
Anas, T., Ridzuan, F., & Pitchay, S. A. (2025). Cover Selection in Steganography: A Systematic Literature Review. Journal of Advanced Research in Applied Sciences and Engineering Technology, 52(2), 107–129. https://doi.org/10.37934/araset.52.2.107129
Apau, R., Asante, M., Twum, F., Ben Hayfron-Acquah, J., & Peasah, K. O. (2024). Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. PLOS ONE, 19(9), 1–47. https://doi.org/10.1371/journal.pone.0308807
Barina, D. (2021). Comparison of Lossless Image Formats. Computer Science Research Notes, 3101, 339–342. https://doi.org/10.24132/CSRN.2021.3101.38
Galal, A. M. (2016). An analytical study on the modern history of digital photography. International Design Journal, 6(2), 203–215. https://www.faa-design.com/files/6/18/6-2-amr.pdf
Google. (2025, April 08). Compression Techniques. WebP. Google for Developers. https://developers.google.com/speed/webp/docs/compression
International Organization for Standardization. (1994). Information technology – Digital compression and coding of continuous-tone still images: Requirements and guidelines (ISO/IEC 10918-1:1994). https://www.iso.org/standard/18902.html
Öztürk, E., & Mesut, A. (2021). Performance evaluation of JPEG standards, WebP and PNG in terms of compression ratio and time for lossless encoding. In M. Yılmaz, & S. Kaya (Eds.). Proceedings of the 2021 6th International Conference on Computer Science and Engineering (UBMK) (n.pp.). IEEE. https://doi.org/10.1109/UBMK52708.2021.9558922
Rumsey, F., & Mccormick, T. (2013). Sound and Recording (6th ed.). New York: Focal Press. https://doi.org/10.4324/9780080953960
W3C. (2025, May 15). Portable Network Graphics (PNG) Specification (3rd ed.). W3C. https://www.w3.org/TR/png-3/
Witten, I. H., Neal, R. M., & Cleary, J. G. (1977, May). Arithmetic coding for data compression. Communications of the ACM, 30(6), 520–540. https://doi.org/10.1145/214762.214771
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Information systems and technologies security

This work is licensed under a Creative Commons Attribution 4.0 International License.
