{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:43Z","timestamp":1773615583312,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700993","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:31:50Z","timestamp":1771936310000},"page":"1440-1447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods"],"prefix":"10.3103","volume":"59","author":[{"given":"A. I.","family":"Bezborodko","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Prisich","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7934_CR1","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/tla.2020.9082720","volume":"18","author":"A.A. Lopez-Hernandez","year":"2020","unstructured":"Lopez-Hernandez, A.A., Martinez-Gonzalez, R.F., Hernandez-Reyes, J.A., Palacios-Luengas, L., and Vazquez-Medina, R., A steganography method using neural networks, IEEE Latin Am. Trans., 2020, vol. 18, no. 3, pp. 495\u2013506. https:\/\/doi.org\/10.1109\/tla.2020.9082720","journal-title":"IEEE Latin Am. Trans."},{"key":"7934_CR2","unstructured":"Kraeva, E.V., Tatarnikova, T.M., Verevkin, S.A., Miklush, V.A., Bogdanov, P.Yu., and Martyn, I.A., Relevance of steganography and its practical usage, Informatsionnye Tekhnologii i Sistemy: Upravlenie, Ekonomika, Transport, Pravo, 2019, no. 3, pp. 105\u2013109."},{"key":"7934_CR3","unstructured":"L\u2019vova, A.P. and Kalashnikova, V.A., Analysis of information protection methods based on use of steganography, Rossiiskaya nauka v sovremennom mire (Russian Science in the Modern World), Moscow, 2017, Moscow: Aktual\u2019nost\u2019.RF, 2017, pp. 109\u2013110."},{"key":"7934_CR4","unstructured":"Egorov, K.N. and Sergienko, L.V., Information security. Steganography, Sostoyanie i perspektivy razvitiya sovremennoi nauki po napravleniyu Informatsionnaya bezopasnost\u2019 (State and Prospects of Development of Modern Science in the Field of Information Security), Anapa, Krasnodar krai, 2020, Anapa, Krasnodar krai: ERA, 2020, pp. 422\u2013431."},{"key":"7934_CR5","doi-asserted-by":"publisher","first-page":"75146","DOI":"10.1109\/access.2024.3405317","volume":"12","author":"A.A. Pekerti","year":"2024","unstructured":"Pekerti, A.A., Sasongko, A., and Indrayanto, A., Secure end-to-end voice communication: A comprehensive review of steganography, modem-based cryptography, and chaotic cryptography techniques, IEEE Access, 2024, vol. 12, pp. 75146\u201375168. https:\/\/doi.org\/10.1109\/access.2024.3405317","journal-title":"IEEE Access"},{"key":"7934_CR6","unstructured":"Nastinov, E.O., Sergienko, V.Yu., and Sheidakov, N.E., Information hiding in images using steganography and LSB method, Sovremennye problemy proektirovaniya, primeneniya i bezopasnosti informatsionnykh sistem (Modern Problems of Design, Application and Security of Information Systems), Kislovodsk, Stavropol krai, 2015, Rostov-on-Don: RINKh, 2015, pp. 95\u2013100."},{"key":"7934_CR7","doi-asserted-by":"publisher","unstructured":"Wendzel, S., Caviglione, L., Mazurczyk, W., Mileva, A., Dittmann, J., Kr\u00e4tzer, Ch., Lamsh\u00f6ft, K., Vielhauer, C., Hartmann, L., Keller, J., and Neubert, T., A revised taxonomy of steganography embedding patterns, Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, 2021, New York: Association for Computing Machinery, 2021, p. 67. https:\/\/doi.org\/10.1145\/3465481.3470069","DOI":"10.1145\/3465481.3470069"},{"key":"7934_CR8","doi-asserted-by":"publisher","first-page":"343","DOI":"10.31577\/cai_2019_2_343","volume":"38","author":"L. Vokorokos","year":"2019","unstructured":"Vokorokos, L., Mado\u0161, B., \u00c1d\u00e1m, N., Bal\u00e1\u017e, A., Porub\u00e4n, J., and Chovancov\u00e1, E., Multi-carrier steganographic algorithm using file fragmentation of FAT FS, Comput. Inf., 2019, vol. 38, no. 2, pp. 343\u2013366. https:\/\/doi.org\/10.31577\/cai_2019_2_343","journal-title":"Comput. Inf."},{"key":"7934_CR9","doi-asserted-by":"publisher","first-page":"29954","DOI":"10.1109\/access.2022.3155146","volume":"10","author":"M.M. Mahmoud","year":"2022","unstructured":"Mahmoud, M.M. and Elshoush, H.T., Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography\u2013An innovative approach, IEEE Access, 2022, vol. 10, pp. 29954\u201329971. https:\/\/doi.org\/10.1109\/access.2022.3155146","journal-title":"IEEE Access"},{"key":"7934_CR10","doi-asserted-by":"publisher","unstructured":"Mishra, Sh., Yadav, V.K., Trivedi, M.Ch., and Shrimali, T., Audio steganography techniques: A survey, Advances in Computer and Computational Sciences, Bhatia, S., Mishra, K., Tiwari, S., and Singh, V., Eds., Advances in Intelligent Systems and Computing, vol. 554, Singapore: Springer, 2018, pp. 581\u2013589. https:\/\/doi.org\/10.1007\/978-981-10-3773-3_56","DOI":"10.1007\/978-981-10-3773-3_56"},{"key":"7934_CR11","volume-title":"Steganography in digital images, Instrumenty i mekhanizmy ustoichivogo innovatsionnogo razvitiya (Tools and Mechanisms of Sustainable Innovative Development), Samara","author":"I.M. Maksimchuk","year":"2022","unstructured":"Maksimchuk, I.M., Steganography in digital images, Instrumenty i mekhanizmy ustoichivogo innovatsionnogo razvitiya (Tools and Mechanisms of Sustainable Innovative Development), Samara, 2022, Ufa: Agenstvo Mezhdunarodnykh Issledovanii, 2022, pp. 68\u201370."},{"key":"7934_CR12","unstructured":"Chastikova, V.A. and Abbasova, S.S., Aspects of using convolutional neural networks or detecting hidden information in images, Vestnik Adygeiskogo Gosudarstvennogo Universiteta. Seriya 4: Estestvenno-Matematicheskie i Tekhnicheskie Nauki, 2021, no. 1, pp. 57\u201361."},{"key":"7934_CR13","doi-asserted-by":"publisher","unstructured":"Sirota, A.A., Dryuchenko, M.A., and Ivankov, A.Yu., Steganalysis of digital images using shallow and deep learning methods: Known approaches and new solutions, Vestnik Voronezhskogo Gosudarstvennogo Universiteta. Seriya: Sistemnyi Analiz i Informatsionnye Tekhnologii, 2021, no. 1, pp. 33\u201352. https:\/\/doi.org\/10.17308\/sait.2021.1\/3369","DOI":"10.17308\/sait.2021.1\/3369"},{"key":"7934_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.18280\/rces.070304","volume":"7","author":"V. Kumar","year":"2020","unstructured":"Kumar, V., Laddha, S., Aniket, and Dogra, N., Steganography techniques using convolutional neural networks, Review of Computer Engineering Studies, 2020, vol. 7, no. 3, pp. 66\u201373. https:\/\/doi.org\/10.18280\/rces.070304","journal-title":"Review of Computer Engineering Studies"},{"key":"7934_CR15","volume-title":"Comparative analysis of the stability of teganographic transformation methods to various stegoanalysis methods, Povyshenie kachestva zhizni i obespechenie konkurentosposobnosti ekonomiki na osnove innovatsionnykh i nauchno-tekhnicheskikh razrabotok (Improv","author":"M.G. Savel\u2019eva","year":"2024","unstructured":"Savel\u2019eva, M.G., Comparative analysis of the stability of teganographic transformation methods to various stegoanalysis methods, Povyshenie kachestva zhizni i obespechenie konkurentosposobnosti ekonomiki na osnove innovatsionnykh i nauchno-tekhnicheskikh razrabotok (Improving the Quality of Life and Ensuring Competitiveness of the Economy on the Basis of Innovative and Scientific-Technical Developments), Minsk, 2024, Minsk: Belorusskii Gosudarstvennyi Tekhnologicheskii Universitet, 2024."},{"key":"7934_CR16","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/s42979-024-02756-x","volume":"5","author":"Sh. Ahmad","year":"2024","unstructured":"Ahmad, Sh., Ogala, J.O., Ikpotokin, F., Arif, Mohd., Ahmad, J., and Mehfuz, Sh., Enhanced CNN-DCT steganography: Deep learning-based image steganography over cloud, SN Computer Science, 2024, vol. 5, no. 4, p. 408. https:\/\/doi.org\/10.1007\/s42979-024-02756-x","journal-title":"SN Computer Science"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700993.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700993","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700993.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:52Z","timestamp":1773612112000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7934"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700993","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"15 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}