<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>2024.
[23] F.J. Massey. The Kolmogorov-Smirnov Test for Goodness of Fit. Journal of the American
Statistical Association</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Development and Research of a Method for Detecting Steganographic Embedding of a Secret Message in a Digital Image ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alla Kobozieva</string-name>
          <email>alla_kobozeva@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kateryna Tryfonova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <email>olaptiev@knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Odesa National Maritime University</institution>
          ,
          <addr-line>Mechnikova str. 34, Odesa, 65029</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska str. 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>22</volume>
      <issue>1</issue>
      <abstract>
        <p>The paper presents the development and experimental evaluation of a novel steganalysis method for detecting hidden information in digital containers without requiring access to the original container. In this study, the term container refers to digital images, including both grayscale and color formats. The proposed approach is based on the statistical analysis of singular values obtained through singular value decomposition of image matrix blocks. The detection method involves analyzing the distribution of the largest singular values and applying the Kolmogorov-Smirnov test to identify deviations from uniformity, which may indicate the presence of steganographic embedding. Experimental results demonstrate the high accuracy of the method in detecting hidden messages embedded using principal component domain modification, particularly at medium and high payload levels. The proposed method ensures a high level of specificity and is characterized by high computational efficiency due to the optimization of the method, making it suitable for real-time applications and large-scale data processing. The findings contribute to enhancing information security and counteracting covert communication channels in cyberspace.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>steganography</kwd>
        <kwd>steganography analysis</kwd>
        <kwd>digital images</kwd>
        <kwd>singular value decomposition 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the modern digital society, where information is among the most valuable assets, ensuring its
protection has become a matter of strategic importance. The rapid growth of data volumes, the
expansion of global networks, and the increasing number of cyber threats underscore the ongoing
need to improve methods for guaranteeing the confidentiality, integrity, and availability of
information. Among the most commonly used means of information protection are cryptographic
methods, which convert plaintext data into an encrypted form that is unintelligible to unauthorized
individuals. At the same time, steganography, the science of concealing the very fact of information
transmission, is increasingly viewed as an alternative or complementary approach to ensuring
information security [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Although cryptography is a powerful tool for ensuring security, it has
certain vulnerabilities, most notably, the fact that the presence of encrypted data itself may attract
the attention of a potential adversary. In contrast, steganography enables the concealment of secret
messages by embedding them into multimedia objects without leaving visible signs of modification,
thereby making detection significantly more difficult. As a result, steganography is considered
particularly valuable in scenarios where it is necessary to ensure not only the confidentiality but also
the imperceptibility of information transmission. Owing to these advantages, steganography has
gained widespread application across various fields. It is effectively employed in military operations,
copyright protection, secure corporate and diplomatic communications, as well as in digital
watermarking and content authentication systems. However, the very properties that make
steganography appealing for legitimate use have also led to its active exploitation in cybercriminal
activities.
      </p>
      <p>
        In 2002, international law enforcement agencies uncovered the activities of the cybercriminal
group known as Shadowz Brotherhood, which was involved in the distribution of child sexual abuse
materials. The perpetrators employed steganographic techniques to conceal illicit content within
image files, particularly in the PNG format, which did not arouse suspicion at first glance. Specialized
software tools were used to embed illegal data into visual objects, making detection significantly
more difficult [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In 2010, the activities of a group of Russian agents, commonly referred to as sleeper spies, were
uncovered in the United States, where they had been conducting long-term intelligence operations.
According to official reports from the Federal Bureau of Investigation, these agents utilized
steganography to transmit classified information to Moscow covertly. Specifically, secret messages
were embedded into ordinary digital images in JPEG format and transmitted via the Internet. As a
result of the Federal Bureau of Investigation's analysis, this method was identified, leading to the
arrest of multiple individuals and the exposure of a large-scale espionage network [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In 2012, a case involving the use of steganography by the terrorist organization Al-Qaeda for
covert transmission of classified information was documented. Specifically, German law
enforcement authorities discovered a pornographic video file into which encrypted text documents
had been embedded using specialized software. These documents contained instructions related to
the planning of terrorist attacks, including methods for constructing improvised explosive devices,
guidelines for evading surveillance, and general operational strategies. The steganographic
embedding enabled the concealment of this content within the video file in a manner undetectable
by standard analytical tools. This incident became one of the first publicly confirmed examples of
steganography being used in the context of terrorism, highlighting its potential as a means of covert
communication and a significant challenge for national security agencies [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In 2021, the use of steganography was documented in the context of cybercrime, particularly
during Magecart-type attacks. Cybercriminals injected malicious JavaScript code into the websites
was concealed
within JPEG files using steganographic techniques, allowing it to appear as ordinary images. These
files were stored on the same servers as legitimate website content, which significantly hindered the
detection of unauthorized activity by traditional cybersecurity tools [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        In 2024, researchers documented a targeted cyberattack, provisionally named SteganoAmor,
orchestrated by the hacker group TA558. This attack represents a sophisticated multivector threat
that combines social engineering, exploitation of known software vulnerabilities, and
steganography. As a result, over 320 organizations operating in the fields of tourism, education,
healthcare, and related sectors were affected. The attack begins with the distribution of phishing
emails containing document attachments. These documents exploit a software vulnerability to
JPEG image, which serves as a carrier of embedded malicious code. This steganographic concealment
allows the image to appear benign, thus evading suspicion from both the user and conventional
security software. Once the image is retrieved and the hidden payload decoded, the malicious code
is executed. A distinguishing feature of this attack is the use of steganography as the primary
mechanism for concealing harmful components. Since the visual characteristics of the carrier images
remain unchanged, traditional antivirus solutions are largely ineffective in detecting the threat [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement</title>
      <p>The increasing misuse of steganographic techniques, particularly in recent years, is reflected in the
growing number of cyberattacks in which hidden messages are embedded in digital content to
transmit commands, exfiltrate confidential data, or distribute malicious software. This trend poses a
tangible threat to information security at both governmental and corporate levels. In this context,
there is a growing relevance and scientific necessity for the development of advanced steganalysis
methods capable of detecting signs of hidden information in the absence of access to the original
cover image. Effective steganalytic tools should not only reveal the presence of covert data
transmission but also facilitate the identification of the specific steganographic techniques employed.</p>
      <p>The object of this study is the process of detecting hidden secret information embedded in digital
graphical content. The subject of the study comprises the methods used for detecting hidden secret
information within digital graphical content. The aim of this study is to improve the effectiveness of
detecting hidden secret information embedded in digital graphical content in cases where the
original cover image is unavailable. To achieve this objective, the research proposes the development
of a steganalysis method based on statistical analysis in the principal component domain.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Literature review</title>
      <p>
        The continuous advancement and growing complexity of digital steganography methods have led to
increased development and a rising number of steganalytic approaches, resulting in a surge of
scientific research focused on the detection and analysis of hidden information in digital media. To
ensure the further advancement of steganographic analysis, it is essential to conduct an in-depth
examination of the advantages, limitations, and specific features of existing methods. Such analysis
enables a well-founded selection of directions for their improvement and adaptation to emerging
challenges. In this context, an appropriate and effective approach is the application of classification
to existing methods, which enables the systematization of knowledge, facilitates analytical
comparison of different solutions, and contributes to the identification of patterns and trends in the
The classification of steganalytic methods is carried out based on selected criteria [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>Depending on the amount of available information, steganalysis methods are classified as targeted
or universal. Targeted methods utilize prior knowledge about the embedding technique, while not
requiring access to the steganographic key. Universal methods are based on detecting distinguishing
features between modified and unmodified digital content.</p>
      <p>Depending on the objective of the attack, steganalysis methods can be classified as static,
dynamic, and auxiliary. Static methods are aimed at detecting the presence of hidden content and
identifying the steganographic method used. Dynamic methods involve analyzing the size and
location of the hidden message, as well as the potential extraction of the concealed information.
Auxiliary methods are intended to trigger the retransmission of the steganographic message in order
to facilitate its subsequent analysis.</p>
      <p>Based on the target of detection, steganalysis methods can be categorized as visual,
signaturebased, and statistical. Visual methods rely on the analysis of visual patterns perceived by the human
visual system. Signature-based methods aim to detect anomalies, such as structural irregularities
within a file. Statistical methods are based on comparing the statistical characteristics of modified
and unmodified content to identify deviations indicative of steganographic embedding.</p>
      <p>
        One of the earliest and most widely used statistical methods is the pairwise value analysis based
s chi-squared criterion [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This method examines pairs of values that differ only in their
least significant bit. After the embedding of random bits, the frequencies of such pairs tend to
equalize, while their total sum remains unchanged. The expected values are compared with the
observed ones, and a significant deviation may indicate the presence of a hidden message. One of
the main limitations of this method is its low effectiveness when the embedded message is short or
has a non-uniform value distribution, as well as its applicability being restricted to uncompressed
images.
      </p>
      <p>
        Research on the embedding of secret messages using the least significant bit method led to the
development of regular-singular analysis [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This method is based on analyzing regular and
singular groups of pixels, which exhibit different responses to a specific bit-flipping operation. The
authors of [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] proposed a technique for constructing a diagram that enables estimation of the length
of the hidden message, even when its location within the pixels is randomized. The primary
drawback of the method is its high sensitivity to noise and its inefficiency when applied to
compressed images.
      </p>
      <p>
        The advancement of steganalytic research for compressed digital images has led to the
development of numerous methods that exploit format-specific characteristics and are based on
analyzing changes in the statistical distributions of frequency coefficients. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], the authors
proposed a method grounded in the observation that image compression leaves a distinctive trace in
the distribution of discrete cosine transform coefficients, and even minor alterations to pixel values
disrupt this consistency.
      </p>
      <p>
        One of the earliest methods to apply machine learning to steganalysis is the approach proposed
by the authors in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The method involves detecting hidden messages in images by analyzing
higher-order statistical features extracted after a wavelet transform. The image is decomposed into
subbands based on scale and orientation, and statistical characteristics are computed for each
subband. The resulting feature vector is then fed into a support vector machine, which classifies the
image as either containing or not containing hidden information.
      </p>
      <p>
        The automation, development, and growing popularity of artificial neural networks have enabled
their application in steganographic analysis. In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], a method for blind steganalysis of digital images
is presented, utilizing an artificial neural network trained on wavelet-based features and image
quality metrics. The developed system classifies images as either containing or not containing hidden
information, without prior knowledge of the embedding method. The designed neural network
requires large volumes of training data and substantial computational resources.
      </p>
      <p>A convolutional neural network architecture for steganalysis of digital images based on a joint
normalization method was proposed in [14]. The authors demonstrate that traditional normalization
degrades the generalization capabilities of the model when using paired training, which is typical in
hidden message detection tasks. The proposed normalization approach employs a unified set of
statistics across all training batches, ensuring more stable learning and improved accuracy during
testing.</p>
      <p>The effectiveness of detecting hidden secret information in digital images using a deep
convolutional neural network was investigated in [15]. The study analyzed three network
implementations based on well-known steganographic datasets. The results confirm the feasibility
of applying the proposed network architecture in steganalysis. Optimization of the network
architecture and its parameters plays a crucial role in the overall performance of steganalysis.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Materials and methods</title>
      <p>The advancement of steganalysis methods for digital images is impossible without the parallel study
of modern steganographic approaches, as the effectiveness of hidden information detection directly
depends on a deep understanding of the principles underlying its embedding. The strategy for
developing steganalysis should be grounded in accumulated knowledge in the field of
steganography, aiming to create detection techniques that outpace contemporary hiding methods
and remain effective even in the presence of new or modified steganographic techniques.</p>
      <p>Despite demonstrating a certain level of effectiveness, neural network based steganalysis
methods cannot be regarded as a universal solution for steganographic analysis tasks. Their
performance largely depends on the volume and quality of training datasets. Moreover, the
inherently low interpretability of such models complicates their application in critical information
security systems. An additional limitation is their high computational complexity, which restricts
their efficiency in resource-constrained environments. Therefore, to ensure reliable steganographic
analysis, it is advisable to investigate modifications of steganographic methods across different
domains, as well as to analyze their interrelationships. An effective approach in this context involves
the development of hybrid models that integrate modern artificial intelligence techniques with
classical statistical and heuristic methods.</p>
      <p>Many steganographic methods employ the principal component domain for embedding secret
information, as it enables an optimal balance between imperceptibility, robustness to distortions, and
controllability of the embedding process. Owing to these properties, the principal component domain
is considered a promising domain for covert data embedding in digital images.</p>
      <p>Singular value decomposition is commonly used to transform data into the principal component
domain, as it enables the efficient extraction of an orthogonal basis representing the main directions
of data variation.</p>
      <p>Let F=(fy,x) be an R×C matrix of a digital image [16], whose elements fy,x, y=1,R, x=1,C. The singular
value decomposition of the matrix F is given by [17,18]:</p>
      <p>=    , (1)
is a matrix of dimensions R×R, that satisfies the relation UTU=I, it is an orthogonal
where U
matrix;</p>
      <p>V is a matrix of dimensions C×C, that satisfies the relation VTV=I, it is an orthogonal matrix;
 is a diagonal matrix with elements 1 C-1,C, such that 0 C C-1 1.</p>
      <p>The columns u1 C of matrix U are the left singular vectors, the columns v1 C of matrix V
are the right singular vectors, and the values 1 C are the singular values of matrix F.</p>
      <p>The singular value decomposition of matrix F is not unique in the general case. According to [19],
a vector is called lexicographically positive if its first nonzero component is positive. The singular
value decomposition F=UVT is called normal if the columns of the matrix U are lexicographically
positive. According to [19], a matrix has a unique normal singular value decomposition if its singular
values are pairwise distinct and nonzero.</p>
      <p>Let us consider a steganographic embedding method for a secret message based on singular value
decomposition, as presented in [20]. The authors note that the proposed approach ensures a high
embedding capacity, demonstrates robustness against typical and some targeted distortions, and that
the results of experimental testing confirmed its resilience to JPEG image compression down to 40%.
To implement the method, the secret message is first converted into a sequence of decimal numbers
according to ASCII codes, which are then transformed into a binary representation, forming a binary
sequence. For a color image selected as the cover, a matrix from one of the color channels is chosen.</p>
      <p>The embedding method of the secret message involves a step-by-step processing of the image
matrix F, which includes dividing it into blocks f of size N×N, each of which is used to embed a single
bit of the message. Singular value decomposition is performed for each block, after which the largest
singular value is quantized using a step size d. Depending on the bit to be embedded, the quantized
value is modified to match the desired parity. Then, an updated value of the largest singular value is
formed, and the inverse reconstruction of the block is carried out. After all blocks have been
processed, the updated image matrix is constructed.</p>
      <p>In [20], experimental results demonstrate that the effectiveness of the method depends on the
quantization step and block size, which can be used as components of the secret key. The influence
of these parameters on the robustness and imperceptibility of the embedded data was investigated.
In particular, increasing the quantization step improves robustness against distortions but reduces
imperceptibility. Optimal values of the parameter d are recommended for the red, green, and blue
channels, along with acceptable ranges of variation for each.</p>
      <p>The extraction method of the secret message involves dividing the image matrix F into blocks f
of size N×N, each used to recover a single bit. Singular value decomposition is performed for each
block, and the largest singular value is quantized using a step size corresponding to the respective
color channel. The embedded bit is determined based on the parity of the quantized value. The
recovered bits are then combined to reconstruct the original message.</p>
      <p>To demonstrate the functionality of the proposed steganographic method, a software
implementation was developed, and an experiment was conducted. A color image of size 872×576
pixels was used as the cover. The embedding was performed in the blue channel, which was
segmented into 8×8 blocks. The generated secret message corresponded to the number of blocks,
with each bit embedded into the largest singular value of the respective block using a quantization
step of d=52. Only the blue channel was modified, while the red and green channels remained
unchanged. The results are presented in Figure 1.
eye is least sensitive to the blue channel, which ensures high visual imperceptibility.</p>
      <p>The steganographic method investigated and implemented for experimental purposes is
considered one of the most effective in ensuring robustness against one of the most common types
of attacks on hidden information, compression attacks, particularly in the JPEG format. The method's
high resilience stems from the fact that modifications are applied not in the pixel domain, but in the
principal component domain, where certain components are less sensitive to global structural
changes caused by compression. Moreover, due to its solid mathematical foundation and the use of
well-formalized block-based parameters, specifically, the largest singular values of each block, the
method exhibit high predictability and controllability. These characteristics ensure its universality
and suitability for further enhancement. The effectiveness of using singular values as information
carriers has been repeatedly emphasized in contemporary scientific literature, further confirming the
relevance of the chosen approach [21, 22]. Thus, the method serves as a conceptual foundation for
the development of modified information hiding schemes with enhanced robustness and stealth.</p>
      <p>A distinguishing feature of the proposed approach is the use of quantization, whereby the values
of components are modified according to a predefined quantization step of the color channel. This
technique enables efficient embedding of information bits while preserving the visual quality of the
image.</p>
      <p>At the same time, the principle that underlies the effectiveness of the embedding process can also
be applied in reverse, for the purpose of detecting potential steganographic activity, specifically the
presence of hidden secret messages. This is achievable even in the absence of access to the original
image or the steganographic key.</p>
      <p>Since the embedding method is characterized by a well-defined mathematical structure,
specifically, the modification of block singular value sets according to a fixed-multiplicity rule, it
becomes possible to develop a specialized steganalysis approach capable of detecting statistical
deviations within the distribution of singular values.</p>
      <p>
        Consider a digital image in which the matrices of each color channel are preliminarily divided
into blocks of fixed size. For each block, singular value decomposition is performed, resulting in a
set of the largest singular values for each color channel. Taking into account the specified
quantization steps for the respective color channels, the following value is computed for the largest
singular value of each block according to the expression:
 = 1 − [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] ∙ 


(2)
d zation step of the color channel;
1  is the largest singular value of the block from the color channel matrix.
      </p>
      <p>For each resulting set of 
constructed.</p>
      <p>Figure 2 presents a set of such histograms for the digital image shown in Figure 1, which was
used as the original image prior to applying the secret message embedding method.</p>
      <p>Figure 3 presents a set of histograms corresponding to the digital image shown in Figure 1, after
applying the method of secret message embedding into the blue color channel.</p>
      <p>The histograms of the color channels constructed for the images before and after applying the
steganographic method are representative of the majority of images used in the conducted statistical
study.</p>
      <p>Based on the available statistical data set, a hypothesis can be formulated regarding their
conformity to a uniform distribution. To verify this hypothesis, an appropriate statistical procedure
must be applied. Such an analysis enables the assessment of how well the empirical data distribution
aligns with the theoretical uniform distribution, which constitutes an important step in further
investigation and justification of the conclusions.</p>
      <p>To confirm or refute the hypothesis regarding the conformity of the statistical data distribution
to the uniform distribution, the Kolmogorov-Smirnov test will be applied [23 25]. The choice of this
test is justified by its non-parametric nature, which does not require prior knowledge of the
parameters of the theoretical distribution. This ensures its versatility and convenience for analyzing
a wide range of empirical data. Furthermore, the Kolmogorov-Smirnov test demonstrates high
effectiveness when working with small and medium-sized samples, which is a significant advantage
over the Pearson test, which is less suitable under such conditions.</p>
      <p>The main steps for applying the Kolmogorov-Smirnov test to assess the hypothesis of uniform
distribution of empirical data are as follows:
1. formulate the hypotheses: null hypothesis H0 the sample comes from a uniform distribution
over the interval [a,b]; alternative hypothesis H1 the sample does not come from a uniform
distribution over [a,b];
2. normalize the data;
3. sort the sample data in ascending order: x1 2
n
;
4. compute the empirical distribution function: for each i calculate   (  ) = ;
5. compute the theoretical distribution function for the uniform distribution:  (  ) =   ;
6. calculate the maximum absolute deviation between the empirical and theoretical distribution


functions:   =</p>
      <p>|  ( ) −  ( )|;</p>
      <sec id="sec-4-1">
        <title>Smirnov critical value table;</title>
        <p>hypothesis H0 is accepted.
7. determine the critical value Dk for the chosen significance level
from the
Kolmogorov8. accept or reject the hypothesis: if Dn&gt;Dk, the null hypothesis H0 is rejected; if Dn k, the null
Taking into account the conducted research, the steganalysis method for digital images based on
the analysis of the singular values of image matrix blocks consists of the following steps:
1. select the matrix F corresponding to a chosen color channel of the image;
2. select the quantization step d appropriate for the chosen color channel;
3. select the block size N of matrix;</p>
        <p>partition the matrix F into non-overlapping blocks f of size N×N;
5. for each block f, perform the following:
a. compute the set of singular values via singular value decomposition f=UVT (1);
b. calculate the statistic</p>
        <p>in accordance with formula (2);
6. apply the Kolmogorov-Smirnov test to the set of
values: if the null hypothesis is accepted,
the container is considered empty; if the hypothesis is rejected, the container is assumed to
contain hidden data.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussions</title>
      <p>The proposed steps of the method are applied to the matrices of each color channel using a
corresponding quantization step selected from the set of permissible values established by the
authors through empirical studies in [20], and for each block partitioning with sizes proposed in [20],
namely 4, 8, 16, 32, and 64.</p>
      <p>During the implementation of the method, a set of parameter combinations is formed, including
F the selected color channel matrix, d
the quantization step, and N
the block size. For each of
these combinations, statistical verification is performed using the Kolmogorov-Smirnov test. If the
null hypothesis of distribution conformity is rejected, the corresponding parameter combination is
interpreted as an indicator of the presence of steganographic embedding. The collection of such
combinations may serve as a steganographic key, enabling the detection of hidden information
transmission within a digital image.
applying the Kolmogorov-Smirnov test to the values of the three color channels of the digital image
shown in Figure 1, which was used as the original image prior to secret message embedding.</p>
      <p>As a result of the study, the null hypothesis regarding distribution conformity was rejected under
the following conditions: F blue color channel, d = 52 quantization step, and N=8 block size,
which together define the steganographic key.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Performance Assessment</title>
      <p>The evaluation of the effectiveness of a steganalysis method is based, in particular, on its ability to
perform reliable binary classification of images with respect to the presence or absence of hidden
secret information. To quantitatively assess the quality of such detection, statistical indicators are
employed that reflect the probability of two types of classification errors. A false positive (type I
error) occurs when the method incorrectly detects hidden data in an image that, in reality, contains
none. A false negative (type II error) arises when the presence of steganographic content goes
undetected. Since reducing the likelihood of one type of error typically increases the other, it is
vity and
an acceptable trade-off between detection accuracy and the probability of false alarms.</p>
      <p>The experimental setup comprised both hardware and software components essential for the
implementation, execution, and evaluation of the steganography and steganalytic processes. All
experiments were carried out on a personal computer equipped with an Intel Core i7 processor, 16
GB of RAM, and operating under the Windows 10 environment. The steganalysis method was
implemented in the C# programming language, utilizing the OpenCV library for image processing
tasks.</p>
      <p>As part of the experimental study, a dataset of digital images in both uncompressed and
compressed formats was created to simulate the process of hidden data embedding with varying
container payload levels. The embedding was carried out using the previously described method,
based on the modification of the largest singular value. Five embedding levels were considered: 5%,
25%, 50%, 75%, and 100% of the maximum number of blocks available for embedding. The secret
messages were generated randomly as binary sequences of the required length, and the embedding
was performed across different color channels. The overall dataset was balanced: half of the images
served as empty containers, while the other half contained embedded data at varying payload levels.
The developed steganalysis method was applied to each image in the dataset to evaluate its detection
performance.</p>
      <p>The analysis of the experimental results revealed a clear pattern. At embedding levels of 100%,
75%, and 50%, the steganographic content was detected with 100% accuracy, without any occurrence
of false negatives (type II errors). Beginning at the 25%
sensitivity was observed, as some instances of hidden data remained undetected, indicating the
presence of type II errors. When the embedding rate was reduced to 5%, the proportion of undetected
steganographic images increased to approximately 30%, demonstrating a significant decrease in
detection effectiveness. It is important to note, however, that throughout the entire series of
experiments, the false positive rate (type I error) remained below 1%, indicating a high level of
specificity for the proposed method.</p>
      <p>In addition to detection accuracy, an equally important characteristic of a steganalysis method is
its computational efficiency, particularly in scenarios requiring large-scale image processing or
realtime performance. A comparative performance analysis of the method was conducted in two
implementation modes: a standard mode involving pixel-by-pixel access to image data, and an
optimized mode that enables direct byte-level access through the use of pointers. This comparison
-sensitive or high-throughput
applications.</p>
      <p>The analysis of the obtained results indicates that the use of the optimized mode for accessing
pixel data significantly reduces the execution time of the steganalysis method, on average by a factor
of 4 to 5 compared to the standard implementation. The most notable improvement in processing
speed is observed at higher embedding levels, where a larger number of blocks must be analyzed.</p>
      <p>Such a result can be explained by the significant overhead inherent in classical image processing
methods, particularly due to the need to create auxiliary objects and to perform data structure
copying or transformation operations. In contrast, the optimized approach provides direct access to
the byte-level representation of the image, which eliminates these overheads and significantly
enhances performance, especially when processing high-resolution or large-volume images.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>This study proposes a novel approach to steganographic analysis of digital images, based on the
detection of anomalies in the distributions of modified components of the largest singular values
within image matrix blocks. The method employs quantization of singular values followed by
statistical evaluation of the resulting data using the Kolmogorov Smirnov test. This enables the
identification of hidden information embedding without requiring access to the original image and
allows for the potential extraction of the steganographic key.</p>
      <p>The results of the experimental study demonstrated the high effectiveness of the proposed
method at medium and high levels of container payload. Specifically, for embedding rates of 50% and
above, the method achieved 100% detection accuracy with no occurrence of false negatives. At the
same time, the false positive rate remained below 1% across the entire dataset, indicating a high
degree of specificity.</p>
      <p>Particular attention was given to the analysis of the computational efficiency of th
implementation. A comparison between the standard approach and an optimized version, based on
-level representation, revealed an average processing speed-up of 4
to 5 times. This performance gain makes the method suitable for real-time applications and for
processing large volumes of image data.</p>
      <p>A promising direction for future research includes the adaptation of the method for video stream
analysis, as well as integration with machine learning techniques to enhance adaptability and
resilience against emerging steganographic attacks.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <sec id="sec-8-1">
        <title>The author(s) have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H.F.</given-names>
            <surname>Konakhovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.O.</given-names>
            <surname>Prohonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Puzyrenko,
          <source>Computer Steganographic Processing and Analysis of Multimedia Data. Kyiv: Center of Educational Literature</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.O.</given-names>
            <surname>Khoroshko</surname>
          </string-name>
          , Yu.Ye. Yaremchuk,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Karpinets</surname>
          </string-name>
          , Computer Steganography: A Textbook.
          <source>Vinnytsia: VNTU</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>BBC</given-names>
            <surname>News</surname>
          </string-name>
          ,
          <article-title>"Accessing the secrets of the brotherhood"</article-title>
          . URL: http://news.bbc.co.uk/2/hi/science/nature/2082657.stm
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>The</given-names>
            <surname>Guardian</surname>
          </string-name>
          ,
          <article-title>"FBI breaks up alleged Russian spy ring in deep cover"</article-title>
          . URL: https://www.theguardian.com/world/2010/jun/29/fbi-breaks
          <article-title>-up-alleged-russian-spy-ringdeep-cover</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Ars</given-names>
            <surname>Technica</surname>
          </string-name>
          ,
          <article-title>"Steganography: how al-Qaeda hid secret documents in a porn video"</article-title>
          . URL: https://arstechnica.com/information-technology/
          <year>2012</year>
          /05/steganography-how-al
          <article-title>-qaeda-hidsecret-documents-in-a-porn-video</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] BleepingComputer, "Hackers hide credit card data from compromised stores in JPG file"</article-title>
          . URL: https://www.bleepingcomputer.com/news/security/hackers-hide
          <article-title>-credit-card-data-fromcompromised-stores-in-jpg-file</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>BleepingComputer</surname>
          </string-name>
          ,
          <article-title>"New SteganoAmor attacks use steganography to target 320 orgs globally"</article-title>
          . URL: https://www.bleepingcomputer.com/news/security/new-steganoamor
          <article-title>-attacks-usesteganography-to-</article-title>
          <string-name>
            <surname>target-</surname>
          </string-name>
          320
          <string-name>
            <surname>-</surname>
          </string-name>
          orgs-globally
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.V.</given-names>
            <surname>Koshkina</surname>
          </string-name>
          ,
          <article-title>Spectral methods of computer steganography and steganoanalysis methods with training and classification</article-title>
          ,
          <source>Doctor of Technical Sciences thesis</source>
          ,
          <source>The National Academy of Sciences of Ukraine</source>
          , V.M. Glushkov Institute of Cybernetics, Kyiv, Ukraine,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Westfeld</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pfitzmann</surname>
          </string-name>
          ,
          <source>Attacks on Steganographic Systems, in Lecture Notes in Computer Science</source>
          , vol.
          <volume>1768</volume>
          ,
          <year>2000</year>
          , pp.
          <fpage>61</fpage>
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fridrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Goljan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <article-title>Reliable detection of LSB steganography in color and grayscale images</article-title>
          , in Challenges,
          <year>2001</year>
          , pp.
          <fpage>27</fpage>
          <lpage>30</lpage>
          . https://doi.org/10.1145/1232454.1232466
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fridrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Goljan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <article-title>Steganalysis based on JPEG compatibility</article-title>
          , in
          <source>International Symposium on the Convergence of IT and Communications</source>
          , Denver, CO, USA,
          <year>2001</year>
          . https://doi.org/10.1117/12.448213
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lyu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Farid</surname>
          </string-name>
          ,
          <article-title>Detecting hidden messages using higher order statistics and support vector machines</article-title>
          ,
          <source>in Proceedings of Lecture Notes in Computer Science, 5th International Workshop on Information Hiding</source>
          , vol.
          <volume>2578</volume>
          ,
          <year>2002</year>
          , pp.
          <fpage>340</fpage>
          <lpage>354</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Davidson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bergman</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Bartlett,</surname>
          </string-name>
          <article-title>An artificial neural network for wavelet steganalysis</article-title>
          ,
          <source>in Proceedings of SPIE: The International Society for Optical Engineering, Mathematical Methods in Pattern and Image Analysis</source>
          , vol.
          <volume>5916</volume>
          ,
          <year>2005</year>
          , pp.
          <fpage>1</fpage>
          <lpage>10</lpage>
          . https://doi.org/10.1117/12.615280
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>