• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • A
  • A
  • A
  • A
  • A
Обычная версия сайта
  • RU
  • EN
  • HSE University
  • Publications
  • Book chapter
  • An adaptive algorithm for the steganographic embedding information into the discrete Fourier transform phase spectrum
  • RU
  • EN
Расширенный поиск
Высшая школа экономики
Национальный исследовательский университет
Priority areas
  • business informatics
  • economics
  • engineering science
  • humanitarian
  • IT and mathematics
  • law
  • management
  • mathematics
  • sociology
  • state and public administration
by year
  • 2027
  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999
  • 1998
  • 1997
  • 1996
  • 1995
  • 1994
  • 1993
  • 1992
  • 1991
  • 1990
  • 1989
  • 1988
  • 1987
  • 1986
  • 1985
  • 1984
  • 1983
  • 1982
  • 1981
  • 1980
  • 1979
  • 1978
  • 1977
  • 1976
  • 1975
  • 1974
  • 1973
  • 1972
  • 1971
  • 1970
  • 1969
  • 1968
  • 1967
  • 1966
  • 1965
  • 1964
  • 1963
  • 1958
  • More
Subject
News
May 20, 2026
HSE University Opens First Representative Office of Satellite Laboratory in Brazil
HSE University-St Petersburg opened a representative office of the Satellite Laboratory on Social Entrepreneurship at the University of Campinas in Brazil. The platform is going to unite research and educational projects in the spheres of sustainable development, communications and social innovations.
May 18, 2026
The 'Second Shift' Is Not Why Women Avoid News
Women are more likely than men to avoid political and economic news, but the reasons for this behaviour are linked less to structural inequality or family-related stress than to personal attitudes and the emotional perception of news content. This conclusion was reached by HSE researchers after analysing data from a large-scale survey of more than 10,000 residents across 61 regions of Russia. The study findings have been published in Woman in Russian Society.
May 15, 2026
Preserving Rationality in a Period of Turbulence
The HSE International Laboratory for Logic, Linguistics and Formal Philosophy studies logic and rationality in a transformed world characterised by a diversity of logical systems and rational agents. The laboratory supports and develops academic ties with Russian and international partners. The HSE News Service spoke with the head of the laboratory, Prof. Elena Dragalina-Chernaya, about its work.

 

Have you spotted a typo?
Highlight it, click Ctrl+Enter and send us a message. Thank you for your help!

Publications
  • Books
  • Articles
  • Chapters of books
  • Working papers
  • Report a publication
  • Research at HSE

?

An adaptive algorithm for the steganographic embedding information into the discrete Fourier transform phase spectrum

.
Evsyutin O., Kokurina A., Мещеряков Р. В., Шумская О. О.

On the example of digital images there are investigated properties of the discrete Fourier transform (DFT) used to embed information into the phase spectrum. The investigation helped to form a new steganografic algorithm that can be used in case of non- compressed images. Peculiarity of the algorithm is changeable size of information put into the blocks of stego-image. Characteristics of the suggested algorithm are comparable with the analog ones, they allow to get the correct information without mistakes.

Language: English
DOI
Text on another site
Keywords: steganography information securitydiscrete Fourier transformdigital imagesdigital watermarkingdata hiding

In book

Advances in Intelligent Systems and Computing
Vol. 451: Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16). , Springer, 2016.
Similar publications
2026 ElCon Conference of Young Researchers in Computing & Processing, and Information Security (ElCon-CP)
IEEE, 2026.
Preface IEEE Russia North West Section and Saint Petersburg Electrotechnical University “LETI” are pleased to present the Proceedings of the 2026 ElCon Conference of Young Researchers in Computing & Processing, and Information Security (2026 ElCon-CP) held in St. Petersburg, Russia, on February 3-5, 2026. This conference was hosted by Saint Petersburg Electrotechnical University “LETI”. The ...
Added: April 6, 2026
Фейкинг как инструмент дискредитации армии и деструктивного воздействия на общество: уголовно-правовой аспект
Закомолдин Р. В., Agapov P., Дулькина Л. В., Сибирский юридический вестник 2024 № 2(105) С. 75–82
T he article analyzes faking as one of the tools of encroachment on state, public and military security. It is noted that with the help of fakes, misinformation of society is organized, destructive effects on public consciousness are ensured, and negative public opinion is formed. The analysis is carried out on the example of a ...
Added: January 28, 2026
РАЗРАБОТКА МОДЕЛИ ЦИФРОВОЙ ЗРЕЛОСТИ ГОСУДАРСТВЕННОГО УПРАВЛЕНИЯ В РЕГИОНАХ РОССИЙСКОЙ ФЕДЕРАЦИИ
Styrin E. M., Вопросы государственного и муниципального управления 2025 № 4 С. 35–60
This article addresses the problem of insuffi cient diagnostic depth in the current approaches to assessing the digital maturity of public administration in the regions of the Russian Federation. The federal methodology proposed by the Ministry of Digital Development focuses on external performance indicators of digital transformation but does not fully reveal the internal organizational capabilities of government agencies. ...
Added: December 23, 2025
Screen-Cam Imitation Module for Improving Data Hiding Robustness
Dzhanashia K., Aleksandr Fedosov, Oleg Evsutin, Sensors 2025 Vol. 25 No. 23 Article 7726
Using an attack-simulation module is a well-recognized approach to improving the robustness of end-to-end neural-network-based data-hiding schemes. However, most proposed attack simulators are limited in the types of attacks they cover, usually handling only a basic set of digital transformations. Real, in-demand use cases for data-hiding methods may involve modifications that cannot be modeled by ...
Added: November 28, 2025
Robust image watermarking for diverse channels with template-forming neural network
Dzhanashia K., Evsyutin O., Applied Soft Computing Journal 2026 Vol. 186 Article 114125
Watermarking is a key tool in combating unauthorized content distribution, but its effectiveness is often challenged by the wide range of communication channels that can degrade or remove the watermark. We propose a block neural network-based watermarking scheme for digital images that is robust against diverse transmission channels, including compression, pre-processing, and digital-to-analog conversions such ...
Added: October 31, 2025
Вычисление суммы Гаусса с помощью дискретного преобразования Фурье
Ustinov A., Дальневосточный математический журнал 2014 Т. 14 № 1 С. 90–95
The explicit formula for a Gauss sum is proved using the discrete Fourier transform. The Gauss quadratic reciprocity law is established as a corollary. ...
Added: October 9, 2025
ИКТ-безопасность во внешней политике США в отношении Латинской Америки: кейс дискурса администрации Дж. Байдена
Sokolshchik L., Yanikeeva I., Торопчин Г. В., Вестник Российского университета дружбы народов. Серия: Международные отношения 2025 Т. 25 № 3 С. 469–484
The issue of information and communication technology (ICT) security is becoming increasingly important in the context of international relations and foreign policy. In the present study, the authors analyze the discourse of the Joseph Biden administration in the field of international ICT security in the Latin American dimension, with the aim of identifying the underlying ...
Added: October 7, 2025
Hybrid metaheuristic algorithms for image watermarking: An experimental study
Melman A., Oleg Evsutin, Swarm and Evolutionary Computation 2025 Vol. 99 Article 102163
Invisible image watermarking is a promising method for protecting the copyright of digital images such as photographs, illustrations, and scans. An effective watermarking algorithm embeds a special mark into an image that does not change the image content but can be extracted from it even after some common post-processing operations such as cropping or compression. ...
Added: September 13, 2025
Hybrid domain based data embedding using quantization index modulation and metaheuristic optimization
Melman A., Evsyutin O., Knowledge-Based Systems 2025 Vol. 329 No. B Article 114429
Embedding additional information into digital images is an effective method of data privacy protection. A data hiding scheme needs to have a high level of imperceptibility to provide a high level of security. At the same time, it is necessary to maintain good capacity and ability to extract information in its original form. In this ...
Added: September 9, 2025
АНАЛИЗ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ НА ТЕХНИЧЕСКУЮ СПЕЦИФИКАЦИЮ NETWORK 2030 ARCHITECTURE FRAMEWORK ДЛЯ 6G СЕТЕЙ
Смирнов И. А., Koucheryavy E., В кн.: СБОРНИК МАТЕРИАЛОВ XI МЕЖДУНАРОДНОЙ НАУЧНО-ПРАКТИЧЕСКОЙ КОНФЕРЕНЦИИ «Актуальные аспекты развития науки и общества в эпоху цифровой трансформации» (шифр –МКАА) 6 ноября 2023 года.: М.: ООО "Издательство АЛЕФ", 2023.
In this paper from the point of view of information security (hereinafter IS) the document "FG NET-2030 Technical Specification on Network 2030 Architecture Framework" (hereinafter Technical Specification) released by the International Telecommunication Union (hereinafter ITU) in 2020 is considered. The developed Technical Specification describes architectural principles for 6G public networks, such as: access, routing and ...
Added: September 7, 2025
Overview of methods to improve execution time in image steganography and watermarking
Melman A., Dzhanashia K., Evsyutin O., Computer Standards and Interfaces 2026 Vol. 96 Article 104066
The cybersecurity problems remain extremely relevant in the modern world. Every year image steganography and watermarking schemes are proposed that solve the problems of hidden confidential data transfer and image authentication, respectively. The authors attempt to maximize the main embedding indicators, such as capacity, invisibility, and robustness. However, in practice, the time effectiveness of embedding ...
Added: September 3, 2025
Эволюция доктринальных подходов к роли медиа в вопросах информационной безопасности в РФ и США в XXI веке
Кочкин А. В., Труды по интеллектуальной собственности 2025 Т. 52 № 1 С. 37–44
The author discusses an actual problem of the media evolution in the doctrines of information security of Russia and the United States at the present stage. The research goal was to identify the main interpretations of the media in the current security doctrines of the two countries in the context of the historical transformation of ...
Added: May 23, 2025
Risk Assessment and Mitigation of Information Security Threats in 5G Networks
Ivan A. Smirnov, Koucheryavy E., Elektrotehniski Vestnik/Electrotechnical Review 2025 Vol. 92 No. 3 P. 104–114
Abstract. The 5G communication networks have been destined to become one of the pillars of the digital economy, driven by artificial intelligence (AI), machine learning (ML), Big Data, Internet of Things (IoT) and robotization. The 5G networks have inherited many vulnerabilities from the preceding systems. In this regard, the issue of a proper information security ...
Added: April 28, 2025
CОВРЕМЕННЫЕ ПОДХОДЫ К СОПРОВОЖДЕНИЮ МЕДИЦИНСКИХ ИНФОРМАЦИОННЫХ СИСТЕМ ПРИ ВНЕДРЕНИИ НОВЫХ ТЕХНОЛОГИЙ
Krayushkin D. V., Chepovskiy A., Куликов И. В. et al., Вопросы кибербезопасности 2025 № 2 С. 41–51
The purpose of the study: the digitalization of healthcare has stimulated the development of medical information systems. Studies have become more accessible due to the widespread implementation of digital image exchange in radiology services, as well as the increase in the number and improvement in the quality of radiological equipment. The growing load on the existing ...
Added: April 23, 2025
Проблемы информационной безопасности и их решение в странах Юго-Восточной Азии и Южно-Тихоокеанского региона
Kanaev E., Муратшина К. Г., Nikiporets-Takigawa G. et al., М.: Институт востоковедения РАН, 2024.
In the contemporary world, information security is the most important element of state policy. This collective monograph focuses on information security problems in Southeast Asia and the South Pacific Region. ...
Added: April 8, 2025
К вопросу об информационной безопасности использования искусственного интеллекта преподавателем: угрозы, риски и способы их преодоления
Maksimenkova O. V., Papushina I. O., Shitova N. et al., В кн.: Искусственный интеллект и математика в образовании.: М.: ООО "ИПП "КУНА", 2024. С. 277–292.
The article summarizes the authors' experience gained as a result of research and preparation of a series of training activities for teachers of the National Research University Higher School of Economics aimed at improving personal and corporate information security when working with intelligent tools. The paper analyzes the general problems of information security of teachers ...
Added: April 4, 2025
Множественное встраивание водяных знаков в пространственно-частотную область изображений на основе генетического алгоритма
Melman A., Evsyutin O., Senyukova O., Компьютерная оптика 2025 Т. 49 № 2 С. 273–281
The widespread use of digital content makes the task of protecting author’s and owner’s rights increasingly important, in particular with regard to digital images. Digital watermarking technology is an effective tool that solves many problems associated with proving authorship of images, verifying authenticity, and tracking illegal copying. An effective watermarking algorithm requires achieving high levels ...
Added: March 8, 2025
Модель оценки эффективности систем защиты информации
Душкин А. В., Безопасность информационных технологий 2024 Т. 31 № 4 С. 56–66
The research problem lies in the absence of a comprehensive model for evaluating the effectiveness of information security systems, capable of taking into account both technical security aspects and subjective factors, such as user trust. Furthermore, current methods often either focus on isolated aspects or lack sufficient adaptability to the unique needs and risks of companies. The article ...
Added: January 25, 2025
Proceedings of the 2024 International Conference "Quality Management, Transport and Information Security, Information Technologies" (QM&TIS&IT), 23-27 Sept. 2024
IEEE, 2024.
The themes for this year's conference were chosen as a means of bringing together academics and industrialists, engineering and management research, manufacturing and teaching, and providing a basis for discussion of issues arising across the engineering and business community in relation to Quality Management, Information Technologies, Transport and Information Security aimed at developing engineers and ...
Added: January 15, 2025
  • About
  • About
  • Key Figures & Facts
  • Sustainability at HSE University
  • Faculties & Departments
  • International Partnerships
  • Faculty & Staff
  • HSE Buildings
  • HSE University for Persons with Disabilities
  • Public Enquiries
  • Studies
  • Admissions
  • Programme Catalogue
  • Undergraduate
  • Graduate
  • Exchange Programmes
  • Summer University
  • Summer Schools
  • Semester in Moscow
  • Business Internship
  • Research
  • International Laboratories
  • Research Centres
  • Research Projects
  • Monitoring Studies
  • Conferences & Seminars
  • Academic Jobs
  • Yasin (April) International Academic Conference on Economic and Social Development
  • Media & Resources
  • Publications by staff
  • HSE Journals
  • Publishing House
  • iq.hse.ru: commentary by HSE experts
  • Library
  • Economic & Social Data Archive
  • Video
  • HSE Repository of Socio-Economic Information
  • HSE1993–2026
  • Contacts
  • Copyright
  • Privacy Policy
  • Site Map
Edit