{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:11Z","timestamp":1773615671969,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700792","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:46Z","timestamp":1741962166000},"page":"1164-1168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling"],"prefix":"10.3103","volume":"58","author":[{"given":"D. E.","family":"Vil\u2019khovskii","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7778_CR1","unstructured":"Kopeitsev, V., Steganography in attacks on industrial enterprisesz, 2020. https:\/\/ics-cert.kaspersky.ru\/publications\/reports\/2020\/06\/17\/steganography-in-attacks-on-industrial-enterprises\/. Cited August 15, 2023."},{"key":"7778_CR2","unstructured":"84ckf1r3, Hiding files in pictures: Seven steganographic utilities for Windows, Khaker, 2017. https:\/\/xakep.ru\/2017\/01\/23\/windows-stenographic-tools\/. Cited August 15, 2023."},{"key":"7778_CR3","unstructured":"Steganography Online. http:\/\/stylesuxx.github.io\/steganography\/. Cited August 15, 2023."},{"key":"7778_CR4","unstructured":"StegOnline. https:\/\/stegonline.georgeom.net\/upload. Cited August 15, 2023."},{"key":"7778_CR5","unstructured":"Image steganography tool. https:\/\/tools.icoder.uz\/image-steganography.php. Cited August 15, 2023."},{"key":"7778_CR6","unstructured":"Free online image steganography encoder tool. https:\/\/edchart.com\/free-online-converters\/image-steganography.php. Cited August 15, 2023."},{"key":"7778_CR7","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W. Luo","year":"2010","unstructured":"Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forensics Secur., 2010, vol. 5, no. 2, pp. 201\u2013214. https:\/\/doi.org\/10.1109\/TIFS.2010.2041812","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7778_CR8","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/lsp.2006.870357","volume":"13","author":"J. Mielikainen","year":"2006","unstructured":"Mielikainen, J., LSB matching revisited, IEEE Signal Process. Lett., 2006, vol. 13, no. 5, pp. 285\u2013287. https:\/\/doi.org\/10.1109\/lsp.2006.870357","journal-title":"IEEE Signal Process. Lett."},{"key":"7778_CR9","doi-asserted-by":"publisher","first-page":"381","DOI":"10.2139\/ssrn.3283729","volume":"4","author":"L. Stoyanova","year":"2018","unstructured":"Stoyanova, L. and Veselka, T., Steganography system using LSB methods, SSRN Electronic Journal, 2018, vol.\u00a04, pp. 381\u2013387. https:\/\/doi.org\/10.2139\/ssrn.3283729","journal-title":"SSRN Electronic Journal"},{"key":"7778_CR10","unstructured":"Koch, E. and Zhao, J., Towards robust and hidden image copyright labeling, IEEE Workshop on Nonlinear Signal and Image Processing, 1995, pp. 452\u2013455."},{"key":"7778_CR11","doi-asserted-by":"publisher","unstructured":"Chaumont, M., Deep learning in steganography and steganalysis, Digital Media Steganography: Principles, Algorithms, and Advances, Hassaballah, M., Ed., Cambridge, MA: Academic, 2020, pp. 321\u2013349. https:\/\/doi.org\/10.1016\/B978-0-12-819438-6.00022-0","DOI":"10.1016\/B978-0-12-819438-6.00022-0"},{"key":"7778_CR12","doi-asserted-by":"publisher","first-page":"160","DOI":"10.2352\/issn.2470-1173.2018.07.mwsf-160","volume":"30","author":"M. Chen","year":"2018","unstructured":"Chen, M., Boroumand, M., and Fridrich, J., Deep learning regressors for quantitative steganalysis, Electronic Imaging, 2018, vol. 30, no. 7, p. 160. https:\/\/doi.org\/10.2352\/issn.2470-1173.2018.07.mwsf-160","journal-title":"Electronic Imaging"},{"key":"7778_CR13","doi-asserted-by":"publisher","unstructured":"Cogranne, R., Giboulot, Q., and Bas, P., The ALASKA steganalysis challenge: A first step towards steganalysis Into The Wild, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, 2019, New York: Association for Computing Machinery, 2019, pp. 125\u2013137. https:\/\/doi.org\/10.1145\/3335203.3335726","DOI":"10.1145\/3335203.3335726"},{"key":"7778_CR14","doi-asserted-by":"publisher","unstructured":"Xu, G., Wu, H.-Z., and Shi, Yu.Q., Ensemble of CNNs for steganalysis, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain, 2016, Association for Computing Machinery, 2016, pp. 103\u2013107. https:\/\/doi.org\/10.1145\/2909827.2930798","DOI":"10.1145\/2909827.2930798"},{"key":"7778_CR15","doi-asserted-by":"publisher","first-page":"650503","DOI":"10.1117\/12.696774","volume":"6505","author":"T. Pevny","year":"2007","unstructured":"Pevny, T. and Fridrich, J., Merging Markov and DCT features for multiclass jpeg steganalysis, Proc. SPIE, 2007, vol. 6505, p. 650503. https:\/\/doi.org\/10.1117\/12.696774","journal-title":"Proc. SPIE"},{"key":"7778_CR16","doi-asserted-by":"publisher","unstructured":"Alok, A. and Subhash, S., Fast algorithms for computing the largest empty rectangle, Proceedings of the Third Annual Symposium on Computational Geometry (SCG \u201987), Waterloo, Canada, 1987, Soule, D., Ed., New York: Association for Computing Machinery, 1987, pp. 278\u2013290. https:\/\/doi.org\/10.1145\/41958.41988","DOI":"10.1145\/41958.41988"},{"key":"7778_CR17","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.jcss.2017.05.006","volume":"95","author":"A. Sarkar","year":"2018","unstructured":"Sarkar, A., Biswas, A., Dutt, M., and Bhattacharya, A., Finding a largest rectangle inside a digital object and rectangularization, J. Comput. Syst. Sci., 2018, vol. 95, pp. 204\u2013217. https:\/\/doi.org\/10.1016\/j.jcss.2017.05.006","journal-title":"J. Comput. Syst. Sci."},{"key":"7778_CR18","doi-asserted-by":"crossref","unstructured":"Vil\u2019khovskii, D.E. and Guts, A.K., Method of detecting LSB insertion in low stegopayload artificial color images of a gradient fill, Vestnik Ural\u2019skogo Federal\u2019nogo Okruga. Bezopasnost\u2019 v Informatsionnoi Sfere, 2022, no. 1, pp. 43\u201349.","DOI":"10.14529\/secur220106"},{"key":"7778_CR19","unstructured":"Vil\u2019khovskii, D.E., Detection of LSB inserts in artificial color images with gradient fill with low stegocontainer filling, RF Certificate of State Registration of Software 2022613002, 2022."},{"key":"7778_CR20","unstructured":"Vil\u2019khovskii, D.E., A method for detecting LSB inserts in color photographic images with low stegocontainer filling, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2022, no. 1, pp. 68\u201376."},{"key":"7778_CR21","unstructured":"Vil\u2019khovskii, D.E., Detection of LSB inserts in color photographic images with a low stegocontainer occupancy, RF Certificate of State Registration of Software 2022613021, 2022."},{"key":"7778_CR22","volume-title":"Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow","author":"A. G\u00e9ron","year":"2022","unstructured":"G\u00e9ron, A., Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, Sebastopol, CA: O\u2019Reilly, 2022, 3rd ed."},{"key":"7778_CR23","doi-asserted-by":"crossref","unstructured":"Vil\u2019khovskii, D.E., A method for detecting steganographic inserts embedded by the Koch\u2013Zhao method in images with a low stegocontainer occupancy, Voprosy Zashchity Informatsii, 2022, no. 1, pp. 38\u201342.","DOI":"10.52190\/2073-2600_2022_1_38"},{"key":"7778_CR24","unstructured":"Vil\u2019khovskii, D.E., Detecting steganographic inserts embedded by the Koch\u2013Zhao method in images with a low stegocontainer occupancy, RF Certificate of State Registration of Software 2022613003, 2022."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700792.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700792","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700792.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:06Z","timestamp":1773612186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7778"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700792","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"14 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}