{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:39Z","timestamp":1773615639187,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701062","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:08Z","timestamp":1741962188000},"page":"1392-1395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Method of Embedding Hidden Data into a Message Stream with Noise-Immune Encoding"],"prefix":"10.3103","volume":"58","author":[{"given":"S. V.","family":"Belim","sequence":"first","affiliation":[]},{"given":"S. A.","family":"Gorshkov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7805_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/lcomm.2017.2659718","volume":"21","author":"H. Tian","year":"2017","unstructured":"Tian, H., Sun, J., Chang, C.-C., Qin, J., and Chen, Yo., Hiding information into voice-over-IP streams using adaptive bitrate modulation, IEEE Commun. Lett., 2017, vol. 21, no. 4, pp. 749\u2013752. https:\/\/doi.org\/10.1109\/lcomm.2017.2659718","journal-title":"IEEE Commun. Lett."},{"key":"7805_CR2","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TCOMM.2002.801488","volume":"50","author":"Y.-C. Tseng","year":"2002","unstructured":"Tseng, Y.-C., Chen, Y.-Y., and Pan, H.-K., A secure data hiding scheme for binary images, IEEE Trans. Commun., 2002, vol. 50, no. 8, pp. 1227\u20131231. https:\/\/doi.org\/10.1109\/TCOMM.2002.801488","journal-title":"IEEE Trans. Commun."},{"key":"7805_CR3","unstructured":"Belim, S.V. and Mun\u2019ko, S.N., Algorithm for embedding digital watermark in dynamic memory of executable code, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2022, no. 2, pp. 30\u201334."},{"key":"7805_CR4","first-page":"116","volume":"30","author":"S.V. Belim","year":"2023","unstructured":"Belim, S.V. and Mun\u2019ko, S.N., Steganographic embedding of information in an SVG image on a web page, Bezopasnost\u2019 \n               Informatsionnykh Tekhnologii, 2023, vol. 30, no. 2, pp. 116\u2013126.","journal-title":"Informatsionnykh Tekhnologii"},{"key":"7805_CR5","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1016\/j.procs.2020.04.194","volume":"171","author":"P. Bedi","year":"2020","unstructured":"Bedi, P. and Dua, A., Network steganography using the overflow field of timestamp option in an IPv4 packet, Procedia Computer Science, 2020, vol. 171, pp. 1810\u20131818. https:\/\/doi.org\/10.1016\/j.procs.2020.04.194","journal-title":"Procedia Computer Science"},{"key":"7805_CR6","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.3390\/electronics9122128","volume":"9","author":"M. Smolarczyk","year":"2020","unstructured":"Smolarczyk, M., Szczypiorski, K., and Pawluk, J., Multilayer detection of network steganography, Electronics, 2020, vol. 9, no. 12, p. 2128. https:\/\/doi.org\/10.3390\/electronics9122128","journal-title":"Electronics"},{"key":"7805_CR7","doi-asserted-by":"publisher","first-page":"197","DOI":"10.13069\/jacodesmath.284966","volume":"4","author":"M. Boulagouaz","year":"2017","unstructured":"Boulagouaz, M. and Bouye, M., Correspondence between steganographic protocols and error correcting codes, Journal of Algebra Combinatorics Discrete Structures and Applications, 2017, vol. 4, no. 2, pp. 197\u2013197. https:\/\/doi.org\/10.13069\/jacodesmath.284966","journal-title":"Journal of Algebra Combinatorics Discrete Structures and Applications"},{"key":"7805_CR8","doi-asserted-by":"publisher","unstructured":"Westfeld, A., F5\u2014A steganographic algorithm: High capacity despite better steganalysis, Information Hiding. IH\u00a02001, Moskowitz, I.S., Ed., Lecture Notes in Computer Science, vol. 2137, Berlin: Springer, 2001, pp. 289\u2013302. https:\/\/doi.org\/10.1007\/3-540-45496-9_21","DOI":"10.1007\/3-540-45496-9_21"},{"key":"7805_CR9","unstructured":"van Dijk, M. and Willems, F.M.J., Embedding information in grayscale images, Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux, Enschede, The Netherlands, 2001, Enschede, The Netherlands: Werkgemeenschap voor Informatie- en Communicatietheorie, 2001, pp. 147\u2013154."},{"key":"7805_CR10","doi-asserted-by":"publisher","unstructured":"Sch\u00f6nfeld, D. and Winkler, A., Embedding with syndrome coding based on BCH codes, Proceedings of the 8th workshop on Multimedia and security, Geneva, 2006, New York: Association for Computing Machinery, 2006, pp. 214\u2013223. https:\/\/doi.org\/10.1145\/1161366.1161405","DOI":"10.1145\/1161366.1161405"},{"key":"7805_CR11","doi-asserted-by":"publisher","unstructured":"Zhang, R., Sachnev, V., and Kim, H.J., Fast BCH syndrome coding for steganography, Information Hiding. IH\u00a02009, Katzenbeisser, S. and Sadeghi, A.R., Eds., Berlin: Springer, 2009, vol. 5806, pp. 48\u201358. https:\/\/doi.org\/10.1007\/978-3-642-04431-1_4","DOI":"10.1007\/978-3-642-04431-1_4"},{"key":"7805_CR12","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/tifs.2011.2134094","volume":"6","author":"T. Filler","year":"2011","unstructured":"Filler, T., Judas, J., and Fridrich, J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Trans. Inf. Forensics Secur., 2011, vol. 6, no. 3, pp. 920\u2013935. https:\/\/doi.org\/10.1109\/tifs.2011.2134094","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7805_CR13","doi-asserted-by":"publisher","unstructured":"Qian, Zh., Zhang, X., and Wang, Sh., Matrix selection in high payload embedding, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, 2009, IEEE, 2009, pp. 328\u2013331. https:\/\/doi.org\/10.1109\/iih-msp.2009.10","DOI":"10.1109\/iih-msp.2009.10"},{"key":"7805_CR14","doi-asserted-by":"publisher","unstructured":"Li, B., Wang, M., Huang, J., and Li, X., A new cost function for spatial image steganography, 2014 IEEE International Conference on Image Processing (ICIP), Paris, 2014, IEEE, 2014, pp. 4206\u20134210. https:\/\/doi.org\/10.1109\/icip.2014.7025854","DOI":"10.1109\/icip.2014.7025854"},{"key":"7805_CR15","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/tifs.2015.2473815","volume":"10","author":"L. Guo","year":"2015","unstructured":"Guo, L., Ni, J., Su, W., Tang, Ch., and Shi, Y.-Q., Using statistical image model for JPEG steganography: Uniform embedding revisited, IEEE Trans. Inf. Forensics Secur., 2015, vol. 10, no. 12, pp. 2669\u20132680. https:\/\/doi.org\/10.1109\/tifs.2015.2473815","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7805_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.5121\/ijdps.2012.3207","volume":"3","author":"I. Diop","year":"2012","unstructured":"Diop, I., Farssi, S.M., Khouma, O., Diouf, H.B., Tall, K., and Sylla, K., New steganographic scheme based of Reed\u2013Solomon codes, International Journal of Distributed and Parallel Systems, 2012, vol. 3, no. 2, pp. 81\u201389. https:\/\/doi.org\/10.5121\/ijdps.2012.3207","journal-title":"International Journal of Distributed and Parallel Systems"},{"key":"7805_CR17","first-page":"142","volume":"2","author":"B. Liu","year":"2011","unstructured":"Liu, B., He, J., Huang, J., and Shi, Y.Q., A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, 2011, vol. 2, no. 2, pp. 142\u2013172.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"7805_CR18","doi-asserted-by":"publisher","unstructured":"Zhou, L.-N., Liu, C.-Q., Ping, X.-J., Zhang, T., and Wang, Y.-H., Information hiding method in digital audio signal based on perfect codes, 2006 International Conference on Intelligent Information Hiding and Multimedia, Pasadena, CA, 2006, IEEE, 2006, pp. 609\u2013612. https:\/\/doi.org\/10.1109\/iih-msp.2006.265076","DOI":"10.1109\/iih-msp.2006.265076"},{"key":"7805_CR19","doi-asserted-by":"publisher","unstructured":"Berrou, C., Pyndiah, R., Adde, P., Douillard, C., and Le Bidan, R., An overview of turbo codes and their applications, The European Conference on Wireless Technology, Paris, 2005, IEEE, 2005, pp. 1\u2013 9. https:\/\/doi.org\/10.1109\/ECWT.2005.1617639","DOI":"10.1109\/ECWT.2005.1617639"},{"key":"7805_CR20","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1016\/j.sigpro.2006.12.008","volume":"87","author":"C. Munuera","year":"2007","unstructured":"Munuera, C., Steganography and error-correcting codes, Signal Process., 2007, vol. 87, no. 6, pp. 1528\u20131533. https:\/\/doi.org\/10.1016\/j.sigpro.2006.12.008","journal-title":"Signal Process."},{"key":"7805_CR21","doi-asserted-by":"publisher","first-page":"102434","DOI":"10.1016\/j.jisa.2019.102434","volume":"51","author":"M.A. Belhamra","year":"2020","unstructured":"Belhamra, M.A. and Souidi, E.M., Steganography over redundant residue number system codes, J. Inf. Secur. Appl., 2020, vol. 51, p. 102434. https:\/\/doi.org\/10.1016\/j.jisa.2019.102434","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701062.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701062","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701062.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:38Z","timestamp":1773612158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7805"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701062","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"5 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}