{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:34Z","timestamp":1773615634849,"version":"3.50.1"},"reference-count":7,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.3103\/s0146411622080107","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T14:03:23Z","timestamp":1677593003000},"page":"1007-1015","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Noise-Resistant Coding and Highly Undetectable Stegosystems \u2013 Is the Alliance Successful?"],"prefix":"10.3103","volume":"56","author":[{"given":"V. N.","family":"Kustov","sequence":"first","affiliation":[]},{"given":"A. G.","family":"Krasnov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"7558_CR1","first-page":"41","volume":"2","author":"R. Amirtharajan","year":"2010","unstructured":"Amirtharajan, R., Akila, R., and Deepikachowdavarapu, P., Comparative analysis of image steganography, Int. J. Comput. Appl., 2010, vol. 2, no. 3, pp. 41\u201347.","journal-title":"Int. J. Comput. Appl."},{"key":"7558_CR2","first-page":"239","volume":"1","author":"S. K. Muttoo","year":"2011","unstructured":"Muttoo, S. K., and Kumar, S., A multilayered secure, robust and high capacity image steganographic algorithm, World Comput. Sci. Inf. Technol. J., 2011, vol. 1, no. 5, pp. 239\u2013246.","journal-title":"World Comput. Sci. Inf. Technol. J."},{"key":"7558_CR3","unstructured":"Zolotarev, V.V. and Ovechkin, G.V., High-speed Viterbi decoder based on graphic processors, Materialy Vserossiiskoi nauchn.-tekh. konf. Intellektual\u2019nye i informatsionnye sistemy (Proc. All-Russian Sci.-Tech. Conf. on Intelligent and Information Systems), Tula, 2016, pp. 7\u201310."},{"key":"7558_CR4","unstructured":"Zolotarev, V.V., Zubarev, Yu.B., and Ovechkin, G.V., Mnogoporogovye dekodery i\u00a0optimizatsionnaya teoriya kodirovaniya (Multithreshold Decoders and Optimization Theory of Coding), Moscow: Goryachaya Liniya\u2013Telekom, 2012."},{"key":"7558_CR5","doi-asserted-by":"publisher","unstructured":"Kustov, V. and Silanteva, E., \u00b1 1Highly undetectable stegosystem model using digital still images, 43rd Int. Conf. on Telecommunications and Signal Processing (TSP), Milan, 2020, IEEE, 2020, pp. 6\u20139. \u00a0https:\/\/doi.org\/10.1109\/TSP49548.2020.9163587","DOI":"10.1109\/TSP49548.2020.9163587"},{"key":"7558_CR6","volume-title":"Pomekhoustoichivoe kodirovanie. Metody i\u00a0algoritmy. Spravochnik (Noise Immune Coding: Methods and Algorithms: Reference Book)","author":"V.V. Zolotarev","year":"2004","unstructured":"Zolotarev, V.V. and Ovechkin, G.V., Pomekhoustoichivoe kodirovanie. Metody i\u00a0algoritmy. Spravochnik (Noise Immune Coding: Methods and Algorithms: Reference Book), Zubarev, Yu.B., Ed., Moscow: Goryachaya Liniya\u2013Telekom, 2004."},{"key":"7558_CR7","doi-asserted-by":"publisher","first-page":"012017","DOI":"10.1088\/1742-6596\/1703\/1\/012017","volume":"1703","author":"A.G. Kustov","year":"2020","unstructured":"Kustov, A.G. and Krasnov, A.G., Software model of a highly undetectable stegosystem\u2014\u2295HUGO model, J.\u00a0Phys.: Conf. Ser., 2020, vol. 1703, p. 012017. \u00a0https:\/\/doi.org\/10.1088\/1742-6596\/1703\/1\/012017","journal-title":"J.\u00a0Phys.: Conf. Ser."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080107.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411622080107","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080107.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:35Z","timestamp":1773612155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411622080107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["7558"],"URL":"https:\/\/doi.org\/10.3103\/s0146411622080107","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"29 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}