{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:46Z","timestamp":1773615646446,"version":"3.50.1"},"reference-count":47,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701207","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:09Z","timestamp":1741962189000},"page":"1406-1421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics"],"prefix":"10.3103","volume":"58","author":[{"given":"S. V.","family":"Bezzateev","sequence":"first","affiliation":[]},{"given":"M. Yu.","family":"Fedosenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7807_CR1","doi-asserted-by":"publisher","first-page":"735","DOI":"10.24411\/2658-4964-2020-1105","volume":"3","author":"K.A. Akhrameeva","year":"2020","unstructured":"Akhrameeva, K.A. and Fedosenko, M.Yu., Protection of information by methods of cryptography in modern Russia, StudNet, 2020, vol. 3, no. 9, pp. 735\u2013743. https:\/\/doi.org\/10.24411\/2658-4964-2020-1105","journal-title":"StudNet"},{"key":"7807_CR2","unstructured":"Federal Law On Information, Information Technologies and Information Protection dated July 27, 2006 no.\u00a0149-FZ. https:\/\/www.consultant.ru\/document\/cons_doc_LAW_61798\/. Cited Marh 14, 2023."},{"key":"7807_CR3","unstructured":"Federal Law On Amendments to the Federal Law on Countering Terrorism and Certain Legislative Acts of the Russian Federation in Part of Establishing Additional Measures for Countering Terrorism and Ensuring Public Security dated July 6, 2016 no. 374-FZ. https:\/\/www.consultant.ru\/document\/cons_doc_LAW_201078\/. Cited Marh 14, 2023."},{"key":"7807_CR4","unstructured":"Federal Law On Amendments to the Criminal Code of the Russian Federation and the Criminal Procedure Code of the Russian Federation in Terms of Establishing Additional Measures to Counter Terrorism and Ensure Public Safety dated July 6, 2016 no. 375-FZ. https:\/\/www.consultant.ru\/document\/cons_doc_LAW_201087\/. Cited Marh 14, 2023."},{"key":"7807_CR5","unstructured":"Federal Law On Amending the Criminal Code of the Russian Federation and the Code of Criminal Procedure of the Russian Federation to Establish Additional Measures to Counter Terrorism and Ensure Public Security no. 1039101-6. https:\/\/sozd.duma.gov.ru\/bill\/1039101-6. Cited Marh 14, 2023."},{"key":"7807_CR6","unstructured":"Federal Law On Amendments to Certain Legislative Acts of the Russian Federation Concerning the Establishment of Additional Measures to Combat Terrorism and Ensure Public Security no. 1039149-6. https:\/\/sozd.duma.gov.ru\/bill\/1039101-6. Cited Marh 14, 2023."},{"key":"7807_CR7","unstructured":"Akhrameeva, K.A. and Fedosenko, M.Yu., Comparative analysis of the possibilities of using steganographic software for covert data exchange in the Internet network, Vestnik Sankt-Peterburgskogo Gosudarstvennogo Universiteta Tekhnologii i Dizaina. Seriya 1: Estestvennye i Tekhnicheskie Nauki, 2022, no. 1, pp. 37\u201343."},{"key":"7807_CR8","unstructured":"Fedosenko, M.Yu., A review of the prospects for the use of steganography as a tool for sharing hidden data in the course of misconduct, Sbornik tezisov dokladov kongressa molodykh uchenykh (Collection of Abstracts of Reports of the Congress of Young Scientists), 2023."},{"key":"7807_CR9","unstructured":"Rogovskii, E.A., Does a democratic information society need anonymity?, Rossiya i Amerika v XXI Veke, 2013, no. 1, pp. 7\u20138."},{"key":"7807_CR10","unstructured":"Fedosenko, M.Yu., Sociological study of the knowledge of graduates of educational institutions in the hidden data exchange on the Internet, Skif. Voprosy Studencheskoi Nauki, 2022, no. 1, pp. 287\u2013295."},{"key":"7807_CR11","unstructured":"Garcia, N., Digital steganography and its existence in cybercrime, dimensions, 2018, vol. 640, p. 480."},{"key":"7807_CR12","first-page":"54","volume":"18","author":"N. Alsaidi","year":"2020","unstructured":"Alsaidi, N., Digital steganography in computer forensics, International Journal of Computer Science and Information Security, 2020, vol. 18, no. 5, pp. 54\u201361.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"7807_CR13","doi-asserted-by":"publisher","first-page":"95665","DOI":"10.1109\/access.2019.2929123","volume":"7","author":"K. Wang","year":"2019","unstructured":"Wang, K. and Gao, Q., A coverless plain text steganography based on character features, IEEE Access, 2019, vol.\u00a07, pp. 95665\u201395676. https:\/\/doi.org\/10.1109\/access.2019.2929123","journal-title":"IEEE Access"},{"key":"7807_CR14","unstructured":"Encryption Law of the People\u2019s Republic of China (Adopted at the 14th meeting of the Standing Committee of the 13th National People\u2019s Congress on October 26, 2019). http:\/\/www.npc.gov.cn\/npc\/c30834\/201910\/ 6f7be7dd5ae5459a8de8baf36296bc74.shtml. Cited March 18, 2023."},{"key":"7807_CR15","doi-asserted-by":"publisher","DOI":"10.5040\/9781350225497","volume-title":"The Great Firewall of China: How to Build and Control an Alternative Version of the Internet","author":"J. Griffiths","year":"2019","unstructured":"Griffiths, J., The Great Firewall of China: How to Build and Control an Alternative Version of the Internet, London: Zed Books, 2019."},{"key":"7807_CR16","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.procs.2019.06.086","volume":"154","author":"D.X. Cho","year":"2019","unstructured":"Cho, D.X., Thuong, D.T.H., and Dung, N.K., A method of detecting storage based network steganography using machine learning, Procedia Computer Science, 2019, vol. 154, pp. 543\u2013548. https:\/\/doi.org\/10.1016\/j.procs.2019.06.086","journal-title":"Procedia Computer Science"},{"key":"7807_CR17","unstructured":"Nikulina, T.V., Detecting malicious code in graphic files injected using steganography techniques, Matritsa Nauchnogo Poznaniya, 2021, nos. 1\u20132, pp. 62\u201367."},{"key":"7807_CR18","doi-asserted-by":"publisher","first-page":"10","DOI":"10.22247\/ijcna\/2020\/193270","volume":"7","author":"I.I. Araujo","year":"2020","unstructured":"Araujo, I.I. and Kazemian, H., Vulnerability exploitations using steganography in PDF Files, International Journal of Computer Networks and Applications, 2020, vol. 7, no. 1, pp. 10\u201318. https:\/\/doi.org\/10.22247\/ijcna\/2020\/193270","journal-title":"International Journal of Computer Networks and Applications"},{"key":"7807_CR19","doi-asserted-by":"publisher","first-page":"427","DOI":"10.11591\/eei.v10i1.2508","volume":"10","author":"M.H. Muhammad","year":"2021","unstructured":"Muhammad, M.H., Hussain, H.Sh., Din, R., Samad, H., and Utama, S., Review on feature-based method performance in text steganography, Bulletin of Electrical Engineering and Informatics, 2021, vol. 10, no. 1, pp.\u00a0427\u2013433. https:\/\/doi.org\/10.11591\/eei.v10i1.2508","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"7807_CR20","unstructured":"Svishchenko, M.E. and Tomakova, R.A., Comparison of steganography methods in images, Programmnaya inzheneriya: sovremennye tendentsii razvitiya i primeneniya (PI-2020). Tezisy IV Vserossiiskoi nauchno-prakticheskoi konferentsii, posvyashchennoi 30-letiyu sozdaniya kafedry programmnoi inzhenerii (Software Engineering: Modern Trends of Development and Application (PI-2020): Abstracts of the 4th All-Russian Scientific and Practical Conference Dedicated to the 30th Anniversary of the Establishment of the Department of Software Engineering), Kursk, 2020, Tomakova, R.A., Ed., Kursk: Yugo-Zapadnyi Universitet, 2020, pp. 189\u2013193."},{"key":"7807_CR21","unstructured":"Zavadskaya, T.V. and Krakhmal\u2019, M.V., The study of steganography methods during embedding hidden information in the frequency region of an image, Informatika i Kibernetika, 2020, no. 1, pp. 18\u201326."},{"key":"7807_CR22","unstructured":"Kovalenko, A.N., Chernomorets, A.A., and Petina, M.A., On steganographic methods of data hiding, Nauka i obrazovanie: otechestvennyi i zarubezhnyi opyt. Tezisy Dvadtsat\u2019 pervoi Mezhdunarodnoi nauchno-prakticheskoi konferentsii (Science and Education: Domestic and Foreign Experience: Abstracts of the Twenty-First International Scientific and Practical Conference), Omsk, 2019, pp. 10\u201313."},{"key":"7807_CR23","unstructured":"Rudnichenko, A.K., Application of simple steganography to file transfer on the Internet, Molodoi Uchenyi, 2017, no. 3, pp. 49\u201351."},{"key":"7807_CR24","unstructured":"Ermoshin, A.V. and Smirnov, V.A., Possibilities of using steganography methods when publishing images in the social network Vkontakte, Sovremennye tekhnologii v nauke i obrazovanii - STNO-2020. Tezisy III Mezhdunarodnogo nauchno-tekhnicheskogo foruma (Modern Technologies in Science and Education - STNO-2020: Abstracts of the 3rd International Scientific and Technological Forum), Ryazan, 2020, Milovzorov, O.V., Ed., Ryazan: Ryazanskii Gosudarstvennyi Radiotekhnicheskii Universitet, 2020, vol. 3, pp. 145\u2013149."},{"key":"7807_CR25","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/45.747237","volume":"18","author":"Y. Bassil","year":"1999","unstructured":"Bassil, Y., Steganography: The art of hiding information in plain sight, IEEE Potentials, 1999, vol. 18, no. 1, pp.\u00a010\u201312. https:\/\/doi.org\/10.1109\/45.747237","journal-title":"IEEE Potentials"},{"key":"7807_CR26","unstructured":"Zagoruiko, I.Yu. and Aitov, A.I., Development of a program to hide and extract information in text files, Al\u2019manakh Permskogo Voennogo Instituta Voisk Natsional\u2019noi Gvardii, 2020, no. 2, pp. 38\u201344."},{"key":"7807_CR27","unstructured":"Kraeva, E.V., Tatarnikova, T.M., Bogdanov, P.Yu., Erashev, S.A., and Verevkin, S.A., Implementation of steganography with Python, Informatsionnye Tekhnologii i Sistemy: Upravlenie, Ekonomika, Transport, Pravo, 2019, no. 4, pp. 39\u201343."},{"key":"7807_CR28","unstructured":"Stegano 0.11.1. A pure Python steganography module. https:\/\/pypi.org\/project\/stegano\/. Cited March 24, 2023."},{"key":"7807_CR29","unstructured":"Steganography 0.1.1. Digital image steganography of encrypted text. https:\/\/pypi.org\/project\/steganography\/. Cited March 24, 2023."},{"key":"7807_CR30","first-page":"1129","volume":"5","author":"M.Yu. Fedosenko","year":"2022","unstructured":"Fedosenko, M.Yu. and Bocharov, M.V., Analysis of the information hiding algorithms used in modern steganographic software, StudNet, 2022, vol. 5, no. 2, pp. 1129\u20131141.","journal-title":"StudNet"},{"key":"7807_CR31","doi-asserted-by":"publisher","first-page":"427","DOI":"10.11591\/eei.v10i1.2508","volume":"10","author":"M.H. Muhammad","year":"2021","unstructured":"Muhammad, M.H., Hussain, H.Sh., Din, R., Samad, H., and Utama, S., Review on feature-based method performance in text steganography, Bulletin of Electrical Engineering and Informatics, 2021, vol. 10, no. 1, pp.\u00a0427\u2013433. https:\/\/doi.org\/10.11591\/eei.v10i1.2508","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"7807_CR32","first-page":"253","volume":"17","author":"D.P. Zegzhda","year":"2014","unstructured":"Zegzhda, D.P. and Nikolsky, A.V., Formal security model for virtual machine hypervisors in cloud computing systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 253\u2013262.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7807_CR33","doi-asserted-by":"publisher","unstructured":"Jung, K.-H., A study on machine learning for steganalysis, Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, Da Lat, Viet Nam, 2019, New York: Association for Computing Machinery, 2019, pp. 12\u201315. https:\/\/doi.org\/10.1145\/3310986.3311000","DOI":"10.1145\/3310986.3311000"},{"key":"7807_CR34","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.procs.2019.06.086","volume":"154","author":"D.X. Cho","year":"2019","unstructured":"Cho, D.X., Thuong, D.T.H., and Dung, N.K., A method of detecting storage based network steganography using machine learning, Procedia Computer Science, 2019, vol. 154, pp. 543\u2013548. https:\/\/doi.org\/10.1016\/j.procs.2019.06.086","journal-title":"Procedia Computer Science"},{"key":"7807_CR35","doi-asserted-by":"publisher","unstructured":"Shumskaya, O. and Budkov, V., Comparative study of classification methods in the stegoanalysis of digital images, Nauchnyi Vestnik Novosibirskogo Gosudarstvennogo Tekhnicheskogo Universiteta, 2018, no. 3, pp. 121\u2013134. https:\/\/doi.org\/10.17212\/1814-1196-2018-3-121-134","DOI":"10.17212\/1814-1196-2018-3-121-134"},{"key":"7807_CR36","doi-asserted-by":"publisher","first-page":"78","DOI":"10.3390\/machines9040078","volume":"9","author":"M. Kalinin","year":"2021","unstructured":"Kalinin, M., Krundyshev, V., and Zegzhda, P., Cybersecurity risk assessment in smart city infrastructures, Machines, 2021, vol. 9, no. 4, p. 78. https:\/\/doi.org\/10.3390\/machines9040078","journal-title":"Machines"},{"key":"7807_CR37","doi-asserted-by":"publisher","first-page":"336","DOI":"10.33581\/1561-4085-2019-22-4-336-341","volume":"22","author":"D.V. Ivanov","year":"2019","unstructured":"Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 4, pp. 336\u2013341. https:\/\/doi.org\/10.33581\/1561-4085-2019-22-4-336-341","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7807_CR38","unstructured":"Dymchenko, O.A. and Samokhvalova, S.G., Information hiding in images by Kutter-Jordan-Bossen method, Postulat, 2018, no. 6, p. 92."},{"key":"7807_CR39","doi-asserted-by":"publisher","first-page":"1412","DOI":"10.11591\/ijeecs.v14.i3.pp1412-1419","volume":"14","author":"S. Pramanik","year":"2019","unstructured":"Pramanik, S., Singh, R.P., and Ghosh, R., A new encrypted method in image steganography, Indonesian Journal of Electrical Engineering and Computer Science, 2019, vol. 14, no. 3, pp. 1412\u20131419. https:\/\/doi.org\/10.11591\/ijeecs.v14.i3.pp1412-1419","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"7807_CR40","unstructured":"Informatsionnye tekhnologii. Materialy 84-i nauch.-tekhn. konferentsii professorsko-prepodavatel\u2019skogo sostava, nauchnykh sotrudnikov i aspirantov (s mezhdunarodnym uchastiem) (Information Technologies: Proceedings of the 84th Scientific and Technical Conference of Professors, Teachers, Researchers, and Postgraduates (with International Participation)), Voitov, I.V., Ed., Minsk: Belorusskii Gosudarstvennyi Tekhnicheskii Universitet, 2020."},{"key":"7807_CR41","doi-asserted-by":"publisher","first-page":"14137","DOI":"10.1007\/s11042-020-10284-y","volume":"80","author":"A.H. Mohsin","year":"2021","unstructured":"Mohsin, A.H., Zaidan, A.A., Zaidan, B.B., Mohammed, K.I., Albahri, O.S., Albahri, A.S., and Alsalem, M.A., PSO\u2013Blockchain-based image steganography: Towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture, Multimedia Tools Appl., 2021, vol. 80, no. 9, pp. 14137\u201314161. https:\/\/doi.org\/10.1007\/s11042-020-10284-y","journal-title":"Multimedia Tools Appl."},{"key":"7807_CR42","doi-asserted-by":"publisher","unstructured":"Zegzhda, D.P., Pavlenko, E., and Shtyrkina, A., Cybersecurity and control sustainability in digital economy and advanced production, The Economics of Digital Transformation: Approaching Non-Stable and Uncertain Digitalized Production Systems, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 173\u2013185. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_11","DOI":"10.1007\/978-3-030-59959-1_11"},{"key":"7807_CR43","doi-asserted-by":"publisher","unstructured":"Basuki, A.I. and Rosiyadi, D., Joint transaction-image steganography for high capacity covert communication, 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA), Tangerang, Indonesia, 2019, IEEE, 2019, pp. 41\u201346. https:\/\/doi.org\/10.1109\/ic3ina48034.2019.8949606","DOI":"10.1109\/ic3ina48034.2019.8949606"},{"key":"7807_CR44","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J. Partala","year":"2018","unstructured":"Partala, J., Provably secure covert communication on blockchain, Cryptography, 2018, vol. 2, no. 3, p. 18. https:\/\/doi.org\/10.3390\/cryptography2030018","journal-title":"Cryptography"},{"key":"7807_CR45","doi-asserted-by":"publisher","first-page":"9943402","DOI":"10.1155\/2021\/9943402","volume":"2021","author":"J.-H. Horng","year":"2021","unstructured":"Horng, J.-H., Chang, C.-C., Li, G.-L., Lee, W.-K., and Hwang, S.O., Blockchain-based reversible data hiding for securing medical images, J. Healthcare Eng., 2021, vol. 2021, p. 9943402. https:\/\/doi.org\/10.1155\/2021\/9943402","journal-title":"J. Healthcare Eng."},{"key":"7807_CR46","doi-asserted-by":"publisher","unstructured":"Busygin, A., Kalinin, M., and Konoplev, A., Supporting connectivity of VANET\/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block, SHS Web of Conferences, 2018, vol. 44, p. 00020. https:\/\/doi.org\/10.1051\/shsconf\/20184400020","DOI":"10.1051\/shsconf\/20184400020"},{"key":"7807_CR47","unstructured":"Akhrameeva, K.A., Fedosenko, M.Yu., Gerling, E.Yu., and Yurkin, D.V., Analysis of exchange facilities of hidden data by intruders in internet by stehanography methods, Telekommunikatsii, 2020, no. 8, pp. 14\u201320."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701207.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701207","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701207.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:43Z","timestamp":1773612163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":47,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7807"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701207","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"12 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}