{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T21:00:53Z","timestamp":1776978053357,"version":"3.51.4"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700937","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:53Z","timestamp":1741962173000},"page":"1283-1288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Use of Generative-Adversarial Networks to Counter Steganalysis"],"prefix":"10.3103","volume":"58","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"A. I.","family":"Bezborodko","sequence":"additional","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7792_CR1","unstructured":"InfoWatch: Analytical report on leaks of restricted information in the world and Russia, first half of 2023, https:\/\/www.infowatch.ru\/sites\/default\/files\/analytics\/files\/utechki-informatsii-ogranichennogo-dostupa-v-mire-i-rossii-za-pervoe-polugodie-2023-goda.pdf. Cited April 29, 2024."},{"key":"7792_CR2","unstructured":"Positive Technologies. Cybersecurity in 2023\u20132024: Trends and forecasts, part 5. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/kiberbezopasnost-v-2023-2024-gg-trendy-i-prognozy-chast-pyataya\/. Cited April 29, 2024."},{"key":"7792_CR3","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.3103\/s0146411619080236","volume":"53","author":"E.Yu. Pavlenko","year":"2019","unstructured":"Pavlenko, E.Yu., Model of cyberattacks on digital production systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1017\u20131019. https:\/\/doi.org\/10.3103\/s0146411619080236","journal-title":"Autom. Control Comput. Sci."},{"key":"7792_CR4","unstructured":"Yurenskii, P.V., Methods of statistical and neural network stegoanalysis of covert channels, Innovatsii v Nauke, 2019, no. 1, pp. 11\u201313."},{"key":"7792_CR5","doi-asserted-by":"publisher","unstructured":"Vilkhovskiy, D.E., A survey of steganalylsis methods in the papers of foreign authors, Matematicheskie Struktury i Modelirovanie, 2020, no. 4, pp. 75\u2013102. https:\/\/doi.org\/10.24147\/2222-8772.2020.4.75-102","DOI":"10.24147\/2222-8772.2020.4.75-102"},{"key":"7792_CR6","doi-asserted-by":"publisher","unstructured":"Zegzhda, D.P., Pavlenko, E., and Shtyrkina, A., Cybersecurity and control sustainability in digital economy and advanced production, The Economics of Digital Transformation, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 173\u2013185. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_11","DOI":"10.1007\/978-3-030-59959-1_11"},{"key":"7792_CR7","unstructured":"Oleinik, E.A. and Platonov, V.V., Application of generative-adversarial networks for detection of network attacks in the Internet of Things, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2024, no. 33, pp. 59\u201361."},{"key":"7792_CR8","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.jisa.2018.04.005","volume":"40","author":"K. Karampidis","year":"2018","unstructured":"Karampidis, K., Kavallieratou, E., and Papadourakis, G., A review of image steganalysis techniques for digital forensics, J. Inf. Secur. Appl., 2018, vol. 40, pp. 217\u2013235. https:\/\/doi.org\/10.1016\/j.jisa.2018.04.005","journal-title":"J. Inf. Secur. Appl."},{"key":"7792_CR9","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","volume":"16","author":"W. You","year":"2021","unstructured":"You, W., Zhang, H., and Zhao, X., A Siamese CNN for image steganalysis, IEEE Trans. Inf. Forensics Secur., 2021, vol. 16, pp. 291\u2013306. https:\/\/doi.org\/10.1109\/TIFS.2020.3013204","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7792_CR10","doi-asserted-by":"publisher","unstructured":"Ponomarev, I.V. and Strokin, D.I., Steganographic methods for embedding and detecting hidden messages using GIF images as container files, Izv. Altai. Gos. Univ., 2022, no. 1, pp. 112\u2013115. https:\/\/doi.org\/10.14258\/izvasu(2022)1-18","DOI":"10.14258\/izvasu(2022)1-18"},{"key":"7792_CR11","unstructured":"Fomin, D.V., A modification of the Kutter\u2013Jordan\u2013Bossen information hiding method, Vestnik Amurskogo Gosudarstvennogo Universiteta. Seriya: Estestvennye i Ekonomicheskie Nauki, 2014, no. 65, pp. 58\u201362."},{"key":"7792_CR12","first-page":"79","volume":"18","author":"G.I. Borzunov","year":"2011","unstructured":"Borzunov, G.I. and Solov\u2019ev, A.S., Comparison of Kutter\u2019s and Braindox\u2019s algorithms, Bezopasnost\u2019 \n               Informatsionnykh Tekhnologii, 2011, vol. 18, no. 1, pp. 79\u201380.","journal-title":"Informatsionnykh Tekhnologii"},{"key":"7792_CR13","first-page":"1","volume":"55","author":"R. Meng","year":"2018","unstructured":"Meng, R., Rice, S.G., Wang, J., and Sun, X., A fusion steganographic algorithm based on faster R-CNN, Comput., \n               Mater. Continua, 2018, vol. 55, no. 1, pp. 1\u201316.","journal-title":"Mater. Continua"},{"key":"7792_CR14","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/access.2019.2891247","volume":"7","author":"X. Duan","year":"2019","unstructured":"Duan, X., Jia, K., Li, B., Guo, D., Zhang, E., and Qin, Ch., Reversible image steganography scheme based on a U-Net structure, IEEE Access, 2019, vol. 7, pp. 9314\u20139323. https:\/\/doi.org\/10.1109\/access.2019.2891247","journal-title":"IEEE Access"},{"key":"7792_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/tifs.2023.3318939","volume":"19","author":"D. Huang","year":"2023","unstructured":"Huang, D., Luo, W., Liu, M., Tang, W., and Huang, J., Steganography embedding cost learning with generative multi-adversarial network, IEEE Trans. Inf. Forensics Secur., 2023, vol. 19, pp. 15\u201329. https:\/\/doi.org\/10.1109\/tifs.2023.3318939","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7792_CR16","unstructured":"Litvinov, O.V., Fomin, I.S., and Bakhshiev, A.V., Application of convolutional generative-adversarial networks in video analytics systems, Nedelya nauki SPbPU. Materialy nauchnoi konferentsii s mezhdunarodnym uchastiem (Week of Science of the Peter the Great St. Petersburg Polytechnic University: Proceedings of the Scientific Conference with International Participation), St. Petersburg, 2018, pp. 60\u201363."},{"key":"7792_CR17","doi-asserted-by":"publisher","first-page":"119841","DOI":"10.1016\/j.eswa.2023.119841","volume":"222","author":"A.M. Garda","year":"2023","unstructured":"Garda, A.M., Hern\u00e1ndez, A., Alazab, M., Jung, J., and Camacho, D., Evolving generative adversarial networks to improve image steganography, Expert Syst. Appl., 2023, vol. 222, p. 119841. https:\/\/doi.org\/10.1016\/j.eswa.2023.119841","journal-title":"Expert Syst. Appl."},{"key":"7792_CR18","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1007\/s10044-017-0672-1","volume":"21","author":"H. Bi","year":"2018","unstructured":"Bi, H., Tang, H., Yang, G., Shu, H., and Dillenseger, J.-L., Accurate image segmentation using Gaussian mixture model with saliency map, Pattern Anal. Appl., 2018, vol. 21, no. 3, pp. 869\u2013878. https:\/\/doi.org\/10.1007\/s10044-017-0672-1","journal-title":"Pattern Anal. Appl."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700937.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700937","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700937.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:15Z","timestamp":1773612255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7792"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700937","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"3 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}