Voir la notice de l'article provenant de la source Math-Net.Ru
@article{BGUMI_2021_3_a5, author = {E. A. Blinova and P. P. Urbanovich}, title = {Steganographic method based on hidden messages embedding into bezier curves of svg images}, journal = {Journal of the Belarusian State University. Mathematics and Informatics}, pages = {68--83}, publisher = {mathdoc}, volume = {3}, year = {2021}, language = {en}, url = {http://geodesic.mathdoc.fr/item/BGUMI_2021_3_a5/} }
TY - JOUR AU - E. A. Blinova AU - P. P. Urbanovich TI - Steganographic method based on hidden messages embedding into bezier curves of svg images JO - Journal of the Belarusian State University. Mathematics and Informatics PY - 2021 SP - 68 EP - 83 VL - 3 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/BGUMI_2021_3_a5/ LA - en ID - BGUMI_2021_3_a5 ER -
%0 Journal Article %A E. A. Blinova %A P. P. Urbanovich %T Steganographic method based on hidden messages embedding into bezier curves of svg images %J Journal of the Belarusian State University. Mathematics and Informatics %D 2021 %P 68-83 %V 3 %I mathdoc %U http://geodesic.mathdoc.fr/item/BGUMI_2021_3_a5/ %G en %F BGUMI_2021_3_a5
E. A. Blinova; P. P. Urbanovich. Steganographic method based on hidden messages embedding into bezier curves of svg images. Journal of the Belarusian State University. Mathematics and Informatics, Tome 3 (2021), pp. 68-83. http://geodesic.mathdoc.fr/item/BGUMI_2021_3_a5/
[1] V. G. Gribunin, I. N. Okov, I. V. Turintsev, “Tsifrovaya steganografiya”, Solon-press, Moskva, 2009, 264
[2] P. Urbanovich, K. Chourikov, A. Rimorev, N. Urbanovich, “Text steganography application for protection and transfer of the information”, Przeglad elektrotechniczny, 7 (2010), 95–97
[3] M. Agarwal, “Text steganographic approaches: a comparison”, International Journal of Network Security and Its Applications, 1(5) (2013), 91–106 | DOI
[4] E. Blinova, N. Shutko, “The use of steganographic methods in SVG format graphic files”, New electrical and electronic technologies and their industrial implementation. Proceedings of the 10th International conference (Zakopane, Poland), Lublin University of Technology, Lublin, 2017, 45
[5] N. P. Shutko, “Zaschita i peredacha tekstovoi informatsii na osnove izmeneniya kerninga”, Trudy BGTU. Fizikomatematicheskie nauki i informatika, 2 (2017), 92–95
[6] N. Shutko, P. Urbanovich, P. Zukowski, “A method of syntactic text steganography based on modification of the document-container aprosh”, Przeglad elektrotechniczny, 6 (2018), 82–85 | DOI
[7] E. A. Blinova, A. A. Suschenya, “Primenenie neskolkikh steganograficheskikh metodov dlya osazhdeniya skrytykh dannykh v elektronnykh tekstovykh dokumentakh”, Sistemnyi analiz i prikladnaya informatika, 2 (2019), 32–38 | DOI
[8] P. P. Urbanovich, D. E. Yurashevich, “Ispolzovanie sistemnykh svoistv i parametrov tekstovykh failov v steganograficheskikh prilozheniyakh”, Teoreticheskaya i prikladnaya kriptografiya. Materialy Mezhdunarodnoi nauchnoi konferentsii (Minsk, Belarus), BGU, Minsk, 2020, 68–73
[9] D. Kaur, H. K. Verma, R. K. Singh, “Image steganography: hiding secrets in random LSB pixels”, Soft computing: theories and applications, Springer, Singapore, 2020, 331–341 | DOI | MR
[10] N. Subramanian, O. Elharrouss, S. Al-Maadeed, A. Bouridane, “Image steganography: a review of the recent advances”, IEEE Access, 9 (2021), 23409–23423 | DOI
[11] E. A. Blinova, P. P. Urbanovich, “Steganograficheskii metod na osnove vstraivaniya dopolnitelnykh znachenii koordinat v izobrazheniya formata SVG”, Trudy BGTU. Fiziko-matematicheskie nauki i informatika, 2 (2018), 104–109
[12] E. A. Blinova, A. A. Golik, “Modifikatsiya steganograficheskogo metoda na osnove vstraivaniya dopolnitelnykh znachenii koordinat v izobrazheniya formata SVG”, Razvitie informatizatsii i gosudarstvennoi sistemy nauchno-tekhnicheskoi informatsii (RINTI-2018). Doklady XVII Mezhdunarodnoi konferentsii (Belarus)., OIPI NAN Belarusi, Minsk, 2018, 130–133
[13] G. E. Farin, D. Hansford, “The essentials of CAGD”, A K Peters Ltd, Natick, 2000, 242 | MR