<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id custom-type="elpub" pub-id-type="custom">tuzsut-25</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>Статьи</subject></subj-group></article-categories><title-group><article-title>РЕЦЕНЗИЯ НА КНИГУ «СТЕГАНОГРАФИЯ. АЛГОРИТМЫ И ПРОГРАММНАЯ РЕАЛИЗАЦИЯ»</article-title><trans-title-group xml:lang="en"><trans-title></trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коржик</surname><given-names>В. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Korzhik</surname><given-names>V. ..</given-names></name></name-alternatives><email xlink:type="simple">noemail@neicon.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2018</year></pub-date><pub-date pub-type="epub"><day>07</day><month>04</month><year>2021</year></pub-date><volume>4</volume><issue>1</issue><fpage>102</fpage><lpage>105</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Коржик В.И., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Коржик В.И.</copyright-holder><copyright-holder xml:lang="en">Korzhik V...</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/25">https://tuzs.sut.ru/jour/article/view/25</self-uri></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Fridrich Y. Steganography in Digital Media: Principles, Algorithms and Applicaticks. Cambridge Press, 2010. 462 p.</mixed-citation><mixed-citation xml:lang="en">Fridrich Y. Steganography in Digital Media: Principles, Algorithms and Applicaticks. Cambridge Press, 2010. 462 p.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Cox I. et al. Digital watermarking. MK, 2002.</mixed-citation><mixed-citation xml:lang="en">Cox I. et al. Digital watermarking. MK, 2002.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V. et al. Steganalysis Based on Statistical Properties of the Encrypted Messages // Computer Network Security. 7-th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security: Lecture Notes in Computer Science. 2017. Vol. 10446. PP. 288-298.</mixed-citation><mixed-citation xml:lang="en">Korzhik V. et al. Steganalysis Based on Statistical Properties of the Encrypted Messages // Computer Network Security. 7-th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security: Lecture Notes in Computer Science. 2017. Vol. 10446. PP. 288-298.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И. и др. Цифровая стеганография и цифровые водяные знаки. Часть 1. Цифровая стенография. СПб.: СПбГУТ, 2016. 225 с.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И. и др. Цифровая стеганография и цифровые водяные знаки. Часть 1. Цифровая стенография. СПб.: СПбГУТ, 2016. 225 с.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И. и др. Цифровая стеганография и цифровые водяные знаки. Часть 2. Цифровые водяные знаки. СПб.: СПбГУТ, 2017. 198 с.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И. и др. Цифровая стеганография и цифровые водяные знаки. Часть 2. Цифровые водяные знаки. СПб.: СПбГУТ, 2017. 198 с.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V. On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems // Transaction on Data Hiding and Multimedia Security III: Lecture Notes in Computer Science. 2008. Vol. 4920. PP. 23-32.</mixed-citation><mixed-citation xml:lang="en">Korzhik V. On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems // Transaction on Data Hiding and Multimedia Security III: Lecture Notes in Computer Science. 2008. Vol. 4920. PP. 23-32.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V. Undetectable Spread-Time Stegosystem Based on Noisy Channels // International Journal of Computer Science and Applications, Special Issue on Multimedia Application. 2011. Vol. VIII. Iss. 1.</mixed-citation><mixed-citation xml:lang="en">Korzhik V. Undetectable Spread-Time Stegosystem Based on Noisy Channels // International Journal of Computer Science and Applications, Special Issue on Multimedia Application. 2011. Vol. VIII. Iss. 1.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Morales-Luna G., Nebaeva K. Capacity of a Stegosystem for the Noisy Attack Channel // International Journal of Information Hiding. 2012. Vol. 3 No. 2. PP. 205-211.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Morales-Luna G., Nebaeva K. Capacity of a Stegosystem for the Noisy Attack Channel // International Journal of Information Hiding. 2012. Vol. 3 No. 2. PP. 205-211.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Morales-Luna G. Information hiding through Noisy Channels // Information Hiding: Lecture Notes in Computer Science. 2001. Vol. 2137. PP. 42-50.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Morales-Luna G. Information hiding through Noisy Channels // Information Hiding: Lecture Notes in Computer Science. 2001. Vol. 2137. PP. 42-50.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Morales-Luna G., Lee M.H. On the Existence of Perfect Stegosystems // IWDW: Lecture Notes in Computer Science. Vol. 3710. PP. 30-37.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Morales-Luna G., Lee M.H. On the Existence of Perfect Stegosystems // IWDW: Lecture Notes in Computer Science. Vol. 3710. PP. 30-37.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Morales-Luna G., Lee M.H. Stegosystems Based on Noisy Channels // Proc. IX Spanish Meeting on Cryptology and Information Security. 2006. PP. 379-387.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Morales-Luna G., Lee M.H. Stegosystems Based on Noisy Channels // Proc. IX Spanish Meeting on Cryptology and Information Security. 2006. PP. 379-387.</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Morales-Luna G. Undetectable Spread-Time Stegosystem Based on Noisy Channels // Proc. of International Multiconference on Computer Science and Information Technology. 2010. PP. 723-728.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Morales-Luna G. Undetectable Spread-Time Stegosystem Based on Noisy Channels // Proc. of International Multiconference on Computer Science and Information Technology. 2010. PP. 723-728.</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Небаева К.А., Алексеевс М. Использование модели канала с шумом для построения стегосистемы // Телекоммуникации. 2013. Спецвыпуск. С. 33-36.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И., Небаева К.А., Алексеевс М. Использование модели канала с шумом для построения стегосистемы // Телекоммуникации. 2013. Спецвыпуск. С. 33-36.</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
