M. V. Shakurskii, O. A. Karaulova, E. S. Kartashevskaya
{"title":"双组件隐写系统抵御未经授权的信息提取的能力","authors":"M. V. Shakurskii, O. A. Karaulova, E. S. Kartashevskaya","doi":"10.3103/S014641162308028X","DOIUrl":null,"url":null,"abstract":"<p>In the classical sense, steganography does not pursue the goal of protecting information from extraction, but the use of a two-component steganographic system ensures not only information masking but also cryptographic strength. The article examines the resistance of the steganographic system for embedding a two-component container to information extraction.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"862 - 867"},"PeriodicalIF":0.6000,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction\",\"authors\":\"M. V. Shakurskii, O. A. Karaulova, E. S. Kartashevskaya\",\"doi\":\"10.3103/S014641162308028X\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In the classical sense, steganography does not pursue the goal of protecting information from extraction, but the use of a two-component steganographic system ensures not only information masking but also cryptographic strength. The article examines the resistance of the steganographic system for embedding a two-component container to information extraction.</p>\",\"PeriodicalId\":46238,\"journal\":{\"name\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"volume\":\"57 8\",\"pages\":\"862 - 867\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2024-02-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://link.springer.com/article/10.3103/S014641162308028X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S014641162308028X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction
In the classical sense, steganography does not pursue the goal of protecting information from extraction, but the use of a two-component steganographic system ensures not only information masking but also cryptographic strength. The article examines the resistance of the steganographic system for embedding a two-component container to information extraction.
期刊介绍:
Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision