{"id":"https://openalex.org/W7131315513","doi":"https://doi.org/10.3103/s0146411625700993","title":"Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods","display_name":"Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7131315513","doi":"https://doi.org/10.3103/s0146411625700993"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411625700993","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700993","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126713742","display_name":"A. I. Bezborodko","orcid":null},"institutions":[{"id":"https://openalex.org/I212220629","display_name":"Peter the Great St. Petersburg Polytechnic University","ror":"https://ror.org/02x91aj62","country_code":"RU","type":"education","lineage":["https://openalex.org/I212220629"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"A. I. Bezborodko","raw_affiliation_strings":["Peter the Great St. Petersburg Polytechnic University, 195251, St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Peter the Great St. Petersburg Polytechnic University, 195251, St. Petersburg, Russia","institution_ids":["https://openalex.org/I212220629"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126665862","display_name":"M. A. Prisich","orcid":null},"institutions":[{"id":"https://openalex.org/I212220629","display_name":"Peter the Great St. Petersburg Polytechnic University","ror":"https://ror.org/02x91aj62","country_code":"RU","type":"education","lineage":["https://openalex.org/I212220629"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"M. A. Prisich","raw_affiliation_strings":["Peter the Great St. Petersburg Polytechnic University, 195251, St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Peter the Great St. Petersburg Polytechnic University, 195251, St. Petersburg, Russia","institution_ids":["https://openalex.org/I212220629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5126713742"],"corresponding_institution_ids":["https://openalex.org/I212220629"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.75427496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"59","issue":"8","first_page":"1440","last_page":"1447"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.26100000739097595,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.26100000739097595,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13608","display_name":"Advanced Computational Techniques in Science and Engineering","score":0.10189999639987946,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.05310000106692314,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8418999910354614},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7709000110626221},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6761999726295471},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6525999903678894},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.6107000112533569},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.5496000051498413},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5185999870300293},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5020999908447266}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8418999910354614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8296999931335449},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7709000110626221},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6761999726295471},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6525999903678894},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.6107000112533569},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.5496000051498413},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5185999870300293},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5020999908447266},{"id":"https://openalex.org/C178009071","wikidata":"https://www.wikidata.org/wiki/Q93344","display_name":"Trigonometric functions","level":2,"score":0.49720001220703125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4828000068664551},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4717999994754791},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.4562999904155731},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4426000118255615},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43380001187324524},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4320000112056732},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.40700000524520874},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4032999873161316},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38440001010894775},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.3714999854564667},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3278000056743622},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32589998841285706},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.28949999809265137},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.26440000534057617},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2612000107765198}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411625700993","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700993","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2756734073","https://openalex.org/W2948107741","https://openalex.org/W3020877230","https://openalex.org/W3089080669","https://openalex.org/W3180000151","https://openalex.org/W3195313677","https://openalex.org/W4214703277","https://openalex.org/W4394013894","https://openalex.org/W4398787701"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"an":[3],"approach":[4],"to":[5,94],"increase":[6],"the":[7,22,29,47,69,80,84,87,112,115],"stealthiness":[8,110],"of":[9,31,67,73,83,89,104,114],"image":[10],"steganography":[11],"methods":[12,99],"using":[13,63],"convolutional":[14],"neural":[15],"networks":[16],"(CNNs).":[17],"CNNs":[18],"are":[19,43,100],"integrated":[20],"into":[21],"data":[23,74],"embedding":[24,75],"process":[25],"and":[26,52,71,92,109],"help":[27],"minimize":[28],"traces":[30],"hidden":[32],"information":[33],"that":[34],"can":[35],"be":[36],"detected":[37],"by":[38,96],"steganalyzers.":[39],"Two":[40],"implementation":[41],"variants":[42],"considered:":[44],"based":[45],"on":[46,106],"least":[48],"significant":[49],"bit":[50],"(LSB)":[51],"discrete":[53],"cosine":[54],"transform":[55],"(DCT)":[56],"methods,":[57],"as":[58,60],"well":[59],"their":[61],"modifications":[62],"CNNs.":[64],"The":[65,102],"task":[66],"ensuring":[68],"stealth":[70],"reliability":[72,88],"is":[76],"solved":[77],"in":[78],"stages:":[79],"visual":[81],"quality":[82,108],"stego":[85],"images,":[86],"message":[90],"extraction,":[91],"resistance":[93],"detection":[95],"classical":[97],"steganalysis":[98],"analyzed.":[101],"results":[103],"experiments":[105],"assessing":[107],"confirm":[111],"effectiveness":[113],"proposed":[116],"approach.":[117]},"counts_by_year":[],"updated_date":"2026-02-25T06:22:25.187761","created_date":"2026-02-25T00:00:00"}
