Implementation of the Cosine Transform (DCT) Steganography Method for Embedding Secret Messages in Image Media

Main Article Content

Devi Sari Delima Tumanggor
Evaldo Manurung
Raymon Simamora

Abstract

The increasingly massive exchange of digital data in the information technology era increases the risk of information leaks and misuse, requiring security mechanisms that not only protect the content of messages but also conceal their existence. Steganography is one relevant solution because it can insert secret messages into digital media without arousing visual suspicion. This research aims to implement a Discrete Cosine Transform (DCT)-based steganography method for embedding and extracting secret messages in digital images using the Python programming language. The approach used includes level shifting, image transformation from the spatial domain to the frequency domain using DCT, message bit insertion into the middle frequency coefficients using the Least Significant Bit (LSB) technique, and the inverse DCT process to obtain the stego image and message extraction stage. The system is also equipped with a graphical user interface (GUI) to facilitate the encoding and decoding processes. Test results show that messages can be inserted and extracted back intact without causing significant visual changes to the stego image, thus maintaining image quality. These findings indicate that the DCT method has a high level of imperceptibility and is effective in enhancing the security of digital image-based information. Thus, the DCT-based steganography method can be a reliable alternative solution for security.

Article Details

Section

Articles

How to Cite

Implementation of the Cosine Transform (DCT) Steganography Method for Embedding Secret Messages in Image Media. (2026). International Journal of Science and Informatics Technology (IJOSIT), 1(01), 14-20. https://www.ijosit.org/index.php/ijosit/article/view/3

References

[1] M. E. Danlami, L. L. Raymond, and T. Solomon, “Hybridization of Cryptography and Steganography to Achieve Secret Communication,” International Journal of Advances in Engineering and Management (IJAEM), vol. 5, p. 428, 2023, doi: 10.35629/5252-0508428437.

[2] R. Apau, M. Asante, F. Twum, J. Ben Hayfron-Acquah, and K. O. Peasah, “Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review,” PLoS One, vol. 19, no. 9 September, Sep. 2024, doi: 10.1371/journal.pone.0308807.

[3] K. R. Malik et al., “A hybrid steganography framework using DCT and GAN for secure data communication in the big data era,” Sci. Rep., vol. 15, no. 1, Dec. 2025, doi: 10.1038/s41598-025-01054-7.

[4] “INFORMATION SYSTEM SECURITY USING THE DISCRETE COSINE TRANSFORM (DCT) METHOD”.

[5] T. Babu, R. R. Nair, M. T. Rajesh, and S. Kishore, “Secure Data Embedding in Digital Images: Enhancing Covert Communication with LSB-Based Techniques,” in Procedia Computer Science, Elsevier B.V., 2025, pp. 2091–2100. doi: 10.1016/j.procs.2025.04.459.

[6] M. Abd Al-Hassan Hussein and A. S. Mahdi Ass Ali Hassan Khidhir, “Video Data Steganography Based on Discrete Cosine Transform Method Supervised by,” 2010.

[7] A. Tauhid, M. Tasnim, S. A. Noor, N. Faruqui, and M. A. Yousuf, “A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform,” Journal of Information Security, vol. 10, no. 03, pp. 117–129, 2019, doi: 10.4236/jis.2019.103007.

[8] A. Shajin Nargunam, “STEGANOGRAPHY ALGORITHM BASED ON DISCRETE COSINE TRANSFORM FOR DATA EMBEDDING INTO RAW VIDEO STREAMS.”

[9] E. Walia and P. Jain, “An Analysis of LSB & DCT based Steganography,” 2010.

[10] S. M. A. Al-Momen and L. E. George, “Image Hiding Using Magnitude Modulation on the DCT Coefficients,” 2010.

[11] O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, A. A. M. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 3, pp. 1168–1175, 2019, doi: 10.12928/TELKOMNIKA.V17I3.12230.

[12] S. Napitupulu, R. Revaldo Siagian, R. Simanullang, K. Daniel Manalu, and C. Fao Silalahi, “Implementation of DCT Based Steganography Algorithm to Hide Infor-mation in Images-Septrian Napitupulu et.al Implementation of DCT Based Steganography Algorithm to Hide Information in Images,” Indonesia Article Info ABSTRACT Corresponding Author, vol. 1, 2013.