<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Savunma Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1303-6831</issn>
                                        <issn pub-type="epub">2148-1776</issn>
                                                                                            <publisher>
                    <publisher-name>Millî Savunma Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17134/khosbd.1901133</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Digital Forensics</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Dijital Adli Tıp</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Çok Aşamalı Dijital Belge İş Akışlarında Klasik Steganografi Yöntemlerinin Karşılaştırmalı Dayanıklılık Analizi</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Comparative Durability Analysis of Classical Steganography Methods in Multi-Stage Digital Document Workflows</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0001-3998-054X</contrib-id>
                                                                <name>
                                    <surname>Temiz</surname>
                                    <given-names>Yücel</given-names>
                                </name>
                                                                    <aff>MİLLİ SAVUNMA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-1000-2619</contrib-id>
                                                                <name>
                                    <surname>Gürler Ari</surname>
                                    <given-names>Berna</given-names>
                                </name>
                                                                    <aff>MİLLİ SAVUNMA ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                                                <issue>Advanced Online Publication</issue>
                                                
                        <history>
                                    <date date-type="received" iso-8601-date="20260302">
                        <day>03</day>
                        <month>02</month>
                        <year>2026</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20260405">
                        <day>04</day>
                        <month>05</month>
                        <year>2026</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2002, The Journal of Defense Sciences</copyright-statement>
                    <copyright-year>2002</copyright-year>
                    <copyright-holder>The Journal of Defense Sciences</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Bu çalışmada klasik görüntü steganografi yöntemlerinin dijital belge iş akışları altındaki dayanıklılığı sistematik olarak analiz edilmiştir. LSB, DCT ve DWT tabanlı gömme yöntemleri; JPEG sıkıştırma, PDF rasterizasyonu ve yeniden boyutlandırma gibi çok aşamalı dönüşümler altında değerlendirilmiştir. Deneyler Microsoft COCO veri setinden seçilen 100 görüntü üzerinde gerçekleştirilmiştir. Her görüntüye hata düzeltme kodu ile desteklenen sabit uzunlukta mesaj gömülmüş ve dönüşüm sonrası Bit Error Rate (BER), ECC başarı oranı ve Perfect Recovery Rate (PRR) metrikleri hesaplanmıştır. Sonuçlar, yüksek PSNR ve SSIM değerlerinin her zaman başarılı mesaj geri kazanımı anlamına gelmediğini göstermektedir. LSB yöntemi tüm kalite seviyelerinde başarısız olurken, DCT yöntemi yüksek kalite faktöründe başarılı ancak orta seviyede ani performans kaybı göstermiştir. DWT yöntemi ise kademeli bozulma karakteristiği sergileyerek daha kararlı sonuçlar üretmiştir. Bulgular, klasik yöntemlerin modern belge üretim zincirleri altında farklı davranış sergilediğini ortaya koymaktadır.</p></trans-abstract>
                                                                                                                                    <abstract><p>This study presents a systematic robustness analysis of classical image steganography methods under multi-stage digital document workflows. LSB, DCT, and DWT-based embedding approaches were evaluated under JPEG compression, PDF rasterization, and resizing scenarios. Experiments were conducted on 100 images selected from the Microsoft COCO dataset. A fixed-length message supported by error correction coding was embedded into each image, and post-transformation performance was assessed using Bit Error Rate (BER), ECC success rate, and Perfect Recovery Rate (PRR). Results reveal that high visual quality metrics such as PSNR and SSIM do not necessarily guarantee successful message recovery. The LSB method failed under all compression levels, while the DCT method exhibited a sharp threshold behavior, succeeding only at high-quality factors. In contrast, the DWT-based approach demonstrated gradual degradation characteristics and maintained higher recovery stability at practical compression levels. The findings highlight that classical steganographic techniques behave differently within modern document production chains and emphasize the importance of channel-aware robustness evaluation.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Steganography</kwd>
                                                    <kwd>  Digital document workflow</kwd>
                                                    <kwd>  JPEG compression</kwd>
                                                    <kwd>  Wavelet transform</kwd>
                                                    <kwd>  Robustness analysis</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Steganografi</kwd>
                                                    <kwd>  Dijital belge iş akışı</kwd>
                                                    <kwd>  JPEG sıkıştırma</kwd>
                                                    <kwd>  Dalgacık dönüşümü</kwd>
                                                    <kwd>  Sağlamlık analizi</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] A. Westfeld, “F5—A Steganographic Algorithm,” 2001, pp. 289–302. doi: 10.1007/3-540-45496-9_21.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] I. A. Khalifa, S. M. Saleem, and A. Sengur, “Multilayer Steganalysis in the Encryption Era: A Comprehensive Review,” European Journal of Applied Science, Engineering and Technology, vol. 4, no. 1, pp. 73–99, Dec. 2025, doi: 10.59324/ejaset.2026.4(1).04.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] B. Ari, N. Sobahi, Ö. F. Alçin, A. Sengur, and U. R. Acharya, “Accurate detection of autism using Douglas-Peucker algorithm, sparse coding based feature mapping and convolutional neural network techniques with EEG signals,” Comput. Biol. Med., vol. 143, p. 105311, Apr. 2022, doi: 10.1016/j.compbiomed.2022.105311.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganography in color and grayscale images,” in Proceedings of the 2001 workshop on Multimedia and security new challenges - MM&amp;Sec ’01, New York, New York, USA: ACM Press, 2001, p. 27. doi: 10.1145/1232454.1232466.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] Stéphane Mallat, A Wavelet Tour of Signal Processing. Elsevier, 2009. doi: 10.1016/B978-0-12-374370-1.X0001-8.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] I. Cox, “Digital Watermarking,” J. Electron. Imaging, vol. 11, no. 3, p. 414, Jul. 2002, doi: 10.1117/1.1494075.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] B. Ari, K. Siddique, O. F. Alcin, M. Aslan, A. Sengur, and R. M. Mehmood, “Wavelet ELM-AE Based Data Augmentation and Deep Learning for Efficient Emotion Recognition Using EEG Recordings,” IEEE Access, vol. 10, pp. 72171–72181, 2022, doi: 10.1109/ACCESS.2022.3181887.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] M. Tancik, B. Mildenhall, and R. Ng, “StegaStamp: Invisible Hyperlinks in Physical Photographs.”</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] T.-Y. Lin et al., “Microsoft COCO: Common Objects in Context,” 2014, pp. 740–755. doi: 10.1007/978-3-319-10602-1_48.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Secur. Priv., vol. 1, no. 3, pp. 32–44, May 2003, doi: 10.1109/MSECP.2003.1203220.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] J. Fridrich, Steganography in Digital Media. Cambridge University Press, 2009. doi: 10.1017/CBO9781139192903.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, vol. 38, no. 1, pp. xviii–xxxiv, 1992, doi: 10.1109/30.125072.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] B. F. Barni Mauro, Watermarking Systems Engineering. CRC Press, 2004. doi: 10.1201/9780203913512.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33–46, 2001. doi: 10.1109/79.939835.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] A. Arı, “Analysis of EEG signal for seizure detection based on WPT,” Electron. Lett., vol. 56, no. 25, pp. 1381–1383, Dec. 2020, doi: 10.1049/el.2020.2701.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] V. K. Goyal, “Multiple description coding: compression meets the network,” IEEE Signal Process. Mag., vol. 18, no. 5, pp. 74–93, 2001, doi: 10.1109/79.952806.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] N. Farvardin and V. Vaishampayan, “Optimal quantizer design for noisy channels: An approach to combined source - channel coding,” IEEE Trans. Inf. Theory, vol. 33, no. 6, pp. 827–838, Nov. 1987, doi: 10.1109/TIT.1987.1057373.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] P. Brémaud, “Subband Coding,” in Mathematical Principles of Signal Processing, New York, NY: Springer New York, 2002, pp. 115–126. doi: 10.1007/978-1-4757-3669-4_7.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding Data With Deep Networks,” 2018, pp. 682–697. doi: 10.1007/978-3-030-01267-0_40.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] N. Sobahi, B. Ari, H. Cakar, O. F. Alcin, and A. Sengur, “A New Signal to Image Mapping Procedure and Convolutional Neural Networks for Efficient Schizophrenia Detection in EEG Recordings,” IEEE Sens. J., vol. 22, no. 8, pp. 7913–7919, Apr. 2022, doi: 10.1109/JSEN.2022.3151465.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] B. Gurler Ari, “Non-intrusive load monitoring using Short-Time Fourier Transform (STFT)-based Local Phase Quantization (LPQ) features and hybrid deep–classical learning models,” PeerJ Comput. Sci., vol. 12, p. e3717, Mar. 2026, doi: 10.7717/peerj-cs.3717.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
