<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-2-0-3</article-id><article-id pub-id-type="publisher-id">3490</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;METHODS OF EMBEDDING CONTROL INFORMATION&amp;nbsp;IN IMAGES&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;METHODS OF EMBEDDING CONTROL INFORMATION&amp;nbsp;IN IMAGES&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Chursin</surname><given-names>Dmitry Sergeevich</given-names></name><name xml:lang="en"><surname>Chursin</surname><given-names>Dmitry Sergeevich</given-names></name></name-alternatives><email>dima.chursin@bk.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/2/ИТ_НР_9_2_3.pdf" /><abstract xml:lang="ru"><p>The paper discusses various methods of steganography used to embed control information in digital images. The main focus is on the principles of operation, advantages and disadvantages of each method. Classical and modern methods such as LSD, FT, PVD, MPVD, DCT, S-UNIWARD, WOW, HUGO and Steghide are considered. Their resistance to steganalysis, steganographic capacity and computational complexity are analyzed. Understanding these methods makes it possible to increase the efficiency and safety of using steganographic techniques in various practical tasks.</p></abstract><trans-abstract xml:lang="en"><p>The paper discusses various methods of steganography used to embed control information in digital images. The main focus is on the principles of operation, advantages and disadvantages of each method. Classical and modern methods such as LSD, FT, PVD, MPVD, DCT, S-UNIWARD, WOW, HUGO and Steghide are considered. Their resistance to steganalysis, steganographic capacity and computational complexity are analyzed. Understanding these methods makes it possible to increase the efficiency and safety of using steganographic techniques in various practical tasks.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>steganography</kwd><kwd>steganalysis</kwd><kwd>implementation of control information</kwd><kwd>digital images</kwd><kwd>data protection</kwd><kwd>copyright</kwd></kwd-group><kwd-group xml:lang="en"><kwd>steganography</kwd><kwd>steganalysis</kwd><kwd>implementation of control information</kwd><kwd>digital images</kwd><kwd>data protection</kwd><kwd>copyright</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Denemark T., Fridrich J., Holub V. Further study on the security of S-UNIWARD // SPIE Proceedings. &amp;ndash; 2014. DOI: 10.1117/12.2044803.</mixed-citation></ref><ref id="B2"><mixed-citation>Gajjala R. R., Banchhor S., Abdelmoniem A. M., Dutta A., Canini M., Kalnis P. Huffman Coding Based Encoding Techniques for Fast Distributed Deep Learning // Proceedings of the 1st Workshop on Distributed Machine Learning. &amp;ndash; 2020. DOI: 10.1145/3426745.3431334.</mixed-citation></ref><ref id="B3"><mixed-citation>Kali Linux [Electronic resource]. &amp;ndash; URL: https://www.kali.org/ (date of application: 01.06.2024).</mixed-citation></ref><ref id="B4"><mixed-citation>Negi L., Negi L. Image Steganography Using Steg with AES and LSB // 2021 IEEE 7th International Conference on Computing, Engineering and Design (ICCED). &amp;ndash; 2021. &amp;ndash; DOI: 10.1109/icced53389.2021.9664834.</mixed-citation></ref><ref id="B5"><mixed-citation>Patel H., Dave P. Steganography technique based on DCT coefficients // International Journal of Engineering Research and Applications. &amp;ndash; 2012. &amp;ndash; Vol. 2, no. 1. &amp;ndash; p. 713-717.</mixed-citation></ref><ref id="B6"><mixed-citation>Rabie T. Digital Image Steganography: An FFT Approach // Communications in Computer and Information Science. &amp;ndash; 2012. &amp;ndash; 294 P. DOI: 10.1007/978-3-642-30567-2_18.</mixed-citation></ref><ref id="B7"><mixed-citation>Rojali, Siahaan I., Soewito B. Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security // AIP Conference Proceedings. &amp;ndash; 2017. &amp;ndash; 1867. &amp;ndash; 020035. DOI: 10.1063/1.4994438.</mixed-citation></ref><ref id="B8"><mixed-citation>Steghide [Electronic resource]. &amp;ndash; URL: https://github.com/StefanoDeVuono/steghide (date of application: 01.06.2024).</mixed-citation></ref><ref id="B9"><mixed-citation>Sumathi C., Santanam T., Umamaheswari G. A study of various steganographic techniques used for information hiding // arXiv. &amp;ndash; 2014. &amp;ndash; arXiv:1401.5561.</mixed-citation></ref><ref id="B10"><mixed-citation>Zhang H., Zhang T., Chen H. Revisiting weighted Stego-image Steganalysis for PVD steganography // Multimedia Tools and Applications. &amp;ndash; 2018. &amp;ndash; Vol. 78, No. 6. &amp;ndash; P. 7479-7497. DOI: 10.1007/s11042-018-6473-8.</mixed-citation></ref></ref-list></back></article>