• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • A
  • A
  • A
  • A
  • A
Обычная версия сайта
  • RU
  • EN
  • HSE University
  • Publications
  • Book chapter
  • On the Efficiency of Combinatorial Generation for Adaptive Image Steganography
  • RU
  • EN
Расширенный поиск
Высшая школа экономики
Национальный исследовательский университет
Priority areas
  • business informatics
  • economics
  • engineering science
  • humanitarian
  • IT and mathematics
  • law
  • management
  • mathematics
  • sociology
  • state and public administration
by year
  • 2027
  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999
  • 1998
  • 1997
  • 1996
  • 1995
  • 1994
  • 1993
  • 1992
  • 1991
  • 1990
  • 1989
  • 1988
  • 1987
  • 1986
  • 1985
  • 1984
  • 1983
  • 1982
  • 1981
  • 1980
  • 1979
  • 1978
  • 1977
  • 1976
  • 1975
  • 1974
  • 1973
  • 1972
  • 1971
  • 1970
  • 1969
  • 1968
  • 1967
  • 1966
  • 1965
  • 1964
  • 1963
  • 1958
  • More
Subject
News
April 30, 2026
HSE Researchers Compile Scientific Database for Studying Childrens Eating Habits
The database created at HSE University can serve as a foundation for studying children’s eating habits. This is outlined in the study ‘The Influence of Age, Gender, and Social-Role Factors on Children’s Compliance with Age-Based Nutritional Norms: An Experimental Study Using the Dish-I-Wish Web Application.’ The work has been carried out as part of the HSE Basic Research Programme and was presented at the XXVI April International Academic Conference named after Evgeny Yasin.
April 30, 2026
New Foresight Centre Study Identifies the Most Destructive Global Trends for Humankind
A team of researchers from the HSE International Research and Educational Foresight Centre has examined how global trends affect the quality of human life—from life expectancy to professional fulfilment. The findings of the study titled ‘Human Capital Transformation under the Influence of Global Trends’ were published in Foresight.
April 28, 2026
Scientists Develop Algorithm for Accurate Financial Time Series Forecasting
Researchers at the HSE Faculty of Computer Science benchmarked more than 200,000 model configurations for predicting financial asset prices and realised volatility, showing that performance can be improved by filtering out noise at specific frequencies in advance. This technique increased accuracy in 65% of cases. The authors also developed their own algorithm, which achieves accuracy comparable to that of the best models while requiring less computational power. The study has been published in Applied Soft Computing.

 

Have you spotted a typo?
Highlight it, click Ctrl+Enter and send us a message. Thank you for your help!

Publications
  • Books
  • Articles
  • Chapters of books
  • Working papers
  • Report a publication
  • Research at HSE

?

On the Efficiency of Combinatorial Generation for Adaptive Image Steganography

.
Melman Anna, Evsyutin O., Шабля Ю. В.

The widespread use of remote communication technologies in various fields leads to new tasks of information security. Steganographic embedding is an effective method of protecting information transmitted over an open communication channel. Steganography techniques hide information in digital objects by embedding, making it invisible to an attacker. The most common covers for hiding additional information are multimedia data, in particular digital images. The embedding effectiveness is mainly assessed by the criteria of invisibility and capacity. One of the ways to improve the embedding efficiency is to choose the best location of message bits within the cover object, but it usually takes a long time to iterate through a large number of such embedding options. In this paper, we propose a new approach to finding the best option for steganographic embedding of information into the phase spectrum of the discrete Fourier transform based on the methods of combinatorial generation. The results of the experiments show that the new approach allows us to reduce the best embedding option search time, while the invisibility and capacity indicators remain high.

Language: English
DOI
Keywords: information securitysteganographydigital imagescombinatorial generationcombinatorial set
Publication based on the results of:
Development of methods for reliable and holistic information transmission in multiple access systems with forward error correction and digital watermarks (2021)

In book

Proceedings of VII International Conference «Engineering & Telecommunication — En&T-2021
IEEE, 2021.
Similar publications
On the Use of Metaheuristics of Different Classes and an Island Model for Image Steganography
Anna Melman, Mikhail Alexandrov, Oleg Evsutin, , in: 2025 XIХ International Symposium on Problems of Redundancy in Information and Control Systems (Redundancy), 5-7 Nov. 2025.: IEEE, 2025. P. 1–6.
Digital steganography protects the privacy of data by hiding them in some digital containers, such as images. Protection of confidential messages by hiding them in digital images faces the problem of balancing the main performance indicators, i.e. embedding imperceptibility and capacity. Metaheuristic optimization can be used to flexibly customize embedding options, including parameters and locations ...
Added: January 28, 2026
Hybrid domain based data embedding using quantization index modulation and metaheuristic optimization
Melman A., Evsyutin O., Knowledge-Based Systems 2025 Vol. 329 No. B Article 114429
Embedding additional information into digital images is an effective method of data privacy protection. A data hiding scheme needs to have a high level of imperceptibility to provide a high level of security. At the same time, it is necessary to maintain good capacity and ability to extract information in its original form. In this ...
Added: September 9, 2025
Overview of methods to improve execution time in image steganography and watermarking
Melman A., Dzhanashia K., Evsyutin O., Computer Standards and Interfaces 2026 Vol. 96 Article 104066
The cybersecurity problems remain extremely relevant in the modern world. Every year image steganography and watermarking schemes are proposed that solve the problems of hidden confidential data transfer and image authentication, respectively. The authors attempt to maximize the main embedding indicators, such as capacity, invisibility, and robustness. However, in practice, the time effectiveness of embedding ...
Added: September 3, 2025
ПРОБЛЕМЫ И ВЫЗОВЫ ЦИФРОВОГО ОБЩЕСТВА: ТЕНДЕНЦИИ РАЗВИТИЯ ПРАВОВОГО РЕГУЛИРОВАНИЯ ЦИФРОВЫХ ТРАНСФОРМАЦИЙ (НАУЧНЫЙ ОБЗОР)
Kovaleva N. N., Zhirnova N., Информационное право 2024 № 1(79) С. 40–43
The review is based on the results of the 4.0. International Scientific and Practical Conference «Problems and Challenges of Digital Society: Trends in the Development of Legal Regulation of Digital Transformations», held on May 24-25, 2023 at HSE University. The conference discussed the current trends of scientific research in the information sphere, the transformation of ...
Added: June 28, 2024
Neural networks-based data hiding in digital images: overview
Dzhanashia K., Evsyutin O., Neurocomputing 2024 Vol. 581 Article 127499
Nowadays, neural networks are actively used for data hiding; however, there is currently no systematic knowledge regarding their utilization in this field. This is a significant gap, considering that neural network-based data hiding has already formed a large and quite independent area of research. This review aims to provide such systematization. It also provides a ...
Added: March 8, 2024
Methods for countering attacks on image watermarking schemes: overview
Anna Melman, Oleg Evsutin, Journal of Visual Communication and Image Representation 2024 Vol. 99 Article 104073
Image watermarking is an effective and promising technology. Robust watermarks, resistant to various attacks, allow authors and owners of digital images to protect their rights to digital content, control its distribution and confirm its authenticity. Most of the modern algorithms for robust image watermarking aim to achieve resistance to a large number of different attacks. ...
Added: January 27, 2024
Разработка регионального модельного нормативного акта о правовом информировании как направление правовой политики в сфере информационной безопасности
Соколов А. Ю., Soldatkina O., Вестник Пермского университета. Юридические науки 2023 № 4 (62) С. 602–612
Introduction: the study discusses legal information distribution as an important tool of legal policy in the field of information security, as its priority aimed at ensuring a proper level of information security of the population. A promising direction in this area is shifting a focus on the activities of constituent entities, including those aimed at ...
Added: January 19, 2024
FPGA implementation of robust and low complexity template-based watermarking for digital images
Dzhanashia K., Oleg Evsutin, Multimedia Tools and Applications 2024 Vol. 83 No. 20 P. 58855–58874
Watermarking is a widespread technique for information protection and an invisible alternative to quick response codes. The literature mainly considers software implementations of watermarking methods, even though there are applications for which hardware watermarking solutions become preferable or the only possible option due to increased speed, power, or information safety requirements. A convenient, flexible, and ...
Added: December 14, 2023
Detection types of steganographic attacks based on semi-fragile watermarks using machine learning
Isaeva M. N., , in: WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS. 2021. (WECONF 2021) St. Petersburg, Russia, 31 May - 4 June 2021.: IEEE, 2021. P. 1–4.
This article discusses how to detected types of steganographic attacks on digital images using semi-fragile watermarks using machine learning techniques. This article discusses different methods of introducing watermarks: into the spatial domain and the transformation domain. The attacks in this case are filters that can be applied to images: blurring, adding noise, sharpness, contrast, color ...
Added: July 17, 2023
Image data hiding schemes based on metaheuristic optimization: a review
Anna Melman, Oleg Evsutin, Artificial Intelligence Review 2023 Vol. 56 No. 12 P. 15375–15447
The digital content exchange on the Internet is associated with information security risks. Hiding data in digital images is a promising direction in data protection and is an alternative to cryptographic methods. Steganography algorithms create covert communication channels and protect the confidentiality of messages embedded in cover images. Watermarking algorithms embed invisible marks in images ...
Added: June 15, 2023
Prospects of Legal Regulating Use of Driverless Transportation Vehicles in the Russian Federation
Deineko A.G., Legal Issues in the Digital Age 2021 No. 3 P. 33–57
The article reviews the new Russian legislation introducing the experimental legal regime for the use of highly automated transportation vehicles (HATVs) (driverless vehicles) on public roads. The article analyzes strategic planning documents related to the subject, such as the governmental Traffic Safety Concept for Public Roads with Driverless Transportation Vehicles (DTVs) and the European Union’s ...
Added: March 18, 2022
Watermarking Schemes for Digital Images: Robustness Overview
Evsutin O., Dzhanashia K., Signal Processing: Image Communication 2022 Vol. 100 Article 116523
Digital watermarking is an important scientific direction located at the intersection of cybersecurity and multimedia processing. Digital watermarking is used for digital objects copyright protection and protection against forgery. The importance of those tasks is highlighted by the ongoing COVID-19 pandemic that lasts for more than a year and forced multiple industries to transit to ...
Added: September 26, 2021
Формирование профилей стандартов в обеспечение требуемого уровня качества информационной безопасности
Starykh V., Mukhamedzyanov G., В кн.: Actual Problems of System and Software Engineering. Proceedings of the 6th International Conference Actual Problems of System and Software Engineering. Moscow, Russia, 12-14 November, 2019Vol. 2514.: CEUR Workshop Proceedings, 2019. С. 193–199.
The article deals with the solution of the problems of the formation and use of applied ontologies as a Abstract: The purpose of this article - the forming of theoretical foundations, analysis of working tools and technologies for the construction of an information system that allows to optimize the scanning of IS for compliance with information ...
Added: February 2, 2021
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking
Melman A., Evsyutin O., Shelupanov A., Technologies 2020 Vol. 8 No. 4 Article 79
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems, including smart systems. This paper proposes a technology for protecting electronic documents containing digital images. ...
Added: December 24, 2020
A New Approach to Reducing the Distortion of the Digital Image Natural Model in the DCT Domain When Embedding Information According to the QIM Method
Evsyutin O., Melman A., Мещеряков Р. В. et al., , in: CEUR Workshop ProceedingsVol. 2485: Proceedings of the 29th International Conference on Computer Graphics and Vision (GraphiCon 2019).: CEUR-WS.org, 2019. P. 268–272.
One of the areas of digital image processing is the steganographic embedding of additional information into them. Digital steganography methods are used to ensure the information confidentiality, as well as to track the distribution of digital content on the Internet. Main indicators of the steganographic embedding effectiveness are invisibility to the human eye, characterized by ...
Added: November 1, 2019
Нейросетевой стегоанализ аудиоданных файлов в МР3-формате
Драчев Г. А., Istratov A., Вестник компьютерных и информационных технологий 2019 № 5 С. 28–37
An approach to the detection of hidden information (stegocontainers) in the audio data of MP3 files based on neural network modeling is considered. A multilayer perceptron is used as the instrumental model of the neural network. The structural components of the MP3 file are analyzed: fields containing related information (song titles, album, information about the author, lyrics, etc.), ...
Added: September 25, 2019
  • About
  • About
  • Key Figures & Facts
  • Sustainability at HSE University
  • Faculties & Departments
  • International Partnerships
  • Faculty & Staff
  • HSE Buildings
  • HSE University for Persons with Disabilities
  • Public Enquiries
  • Studies
  • Admissions
  • Programme Catalogue
  • Undergraduate
  • Graduate
  • Exchange Programmes
  • Summer University
  • Summer Schools
  • Semester in Moscow
  • Business Internship
  • Research
  • International Laboratories
  • Research Centres
  • Research Projects
  • Monitoring Studies
  • Conferences & Seminars
  • Academic Jobs
  • Yasin (April) International Academic Conference on Economic and Social Development
  • Media & Resources
  • Publications by staff
  • HSE Journals
  • Publishing House
  • iq.hse.ru: commentary by HSE experts
  • Library
  • Economic & Social Data Archive
  • Video
  • HSE Repository of Socio-Economic Information
  • HSE1993–2026
  • Contacts
  • Copyright
  • Privacy Policy
  • Site Map
Edit