<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Hybrid data protection method combining homomorphic encryption and steganography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Trysnyuk</string-name>
          <email>trysnyuk@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kyrylo Smetanin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ihor Humeniuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Shumeiko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of telecommunications and global information space, NAS of Ukraine</institution>
          ,
          <addr-line>Chokolivsky Boulevard 13, Kyiv, 02000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Korolov Zhytomyr Military Institute Prospect Myru</institution>
          ,
          <addr-line>22, Zhytomyr, 10004</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>In the era of rapidly evolving cyber threats, the protection of sensitive information requires integrating advanced cryptographic techniques with data-hiding technologies. This work proposes a hybrid data-protection approach that combines homomorphic encryption (HE) with content-adaptive image steganography in order to provide both cryptographic confidentiality and channel concealment. In the first stage, sensitive messages are encoded by a homomorphic encryption scheme supporting addition and multiplication over ciphertexts, which enables basic computations without revealing plaintext. Next, the ciphertext stream is segmented, supplemented with a lightweight errorcorrecting code and an authentication tag, and embedded into an image carrier using a load-controlled algorithm. The bit-load distribution follows a map of visual “importance,” computed from local texture statistics (gradient, variance), which minimizes distortion in sensitive regions and reduces the probability of detection by modern statistical and neural steganalyzers. We formalize the system's finite-state pipeline and specify a threat model for two-layer protection: ciphertext robustness in the chosen-plaintext model and concealment robustness against passive/active observers. A reference prototype is implemented and evaluated on standard image datasets and commodity hardware. Experimental results indicate that with payloads ≤ 0.2 bpp high visual quality is maintained (PSNR ≥ 44 dB), while end-to-end throughput exceeds 18 kbit/s-sufficient for telemetry and service scenarios. Comparative tests demonstrate a better “quality-robustnessthroughput” trade-off than non-adaptive schemes at the same stego-capacity and a reduced probability of hidden-content detection.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Homomorphic encryption</kwd>
        <kwd>steganography</kwd>
        <kwd>hybrid data protection</kwd>
        <kwd>information security</kwd>
        <kwd>PSNR</kwd>
        <kwd>covert communication</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Rapid digitalization, cloud computing, and distributed IoT ecosystems intensify the tension
between the need for cryptographic confidentiality and the necessity to conceal the very fact of
transmitting sensitive data. Traditional cryptosystems provide strong confidentiality
guarantees but leave “visible” cipher traffic that is susceptible to blocking, censorship, or traffic
analysis. By contrast, steganography masks the presence of a message; however, without a</p>
      <p>
        © 2025 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
cryptographic layer it does not guarantee resistance to disclosure if the message is detected.
This naturally leads to hybrid approaches in which cryptography and steganography act
synergistically: homomorphic encryption (HE) enables computations to be performed over
ciphertexts, while content-adaptive placement minimizes the statistical visibility of
modifications in the image carrier [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ].
      </p>
      <p>
        HE has evolved from the theoretical breakthrough of fully homomorphic encryption (FHE,
C. Gentry) to practical leveled schemes and software libraries. Schemes of the BFV/BGV class
support exact modular arithmetic over integers, whereas CKKS supports approximate
arithmetic over real/complex numbers, which is important for numerical analytics and signal
processing. Despite progress in bootstrapping, vector (SIMD) packing, and parameter selection,
HE remains computationally and memory intensive: ciphertext expansion, a limited noise
budget, circuit depth, and modulus-level management directly affect throughput and latency
[
        <xref ref-type="bibr" rid="ref1 ref10 ref2 ref3">1–3,10</xref>
        ]. These technological constraints are particularly salient in scenarios where visible
cipher traffic is censored or deprioritized by filtering systems (IoT telemetry, telemedicine,
industrial networks), making the combination of HE with steganography practically motivated.
      </p>
      <p>
        In image steganography, the past decade has witnessed a shift from LSB substitution to
content-adaptive distortion minimization. Early ideas (HUGO) established the principle of
optimizing the “cost” of changes in feature spaces; subsequently, WOW (directional filters) and
S-UNIWARD were proposed as universal distortion functions applicable across domains.
Efficient payload filling for a given cost map is provided by syndrome-trellis codes (STC), while
steganalysis has evolved from “rich” models (SRM) to deep CNNs (SRNet) and large benchmarks
(BOSSBase), substantially improving detection sensitivity at low payloads [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7 ref8 ref9">4–9</xref>
        ]. Against this
backdrop, it is relevant to investigate hybrid pipelines of the form “HE → steganography,”
which decouple semantic confidentiality (encryption) from carrier imperceptibility (placement)
and allow computation on the data while keeping the transmission channel hidden.
      </p>
      <p>The practical motivation for hybridization is reinforced by several engineering challenges.
First, ciphertext “bloat” and the HE noise-budget constraints reduce stego-capacity and
necessitate careful packing and fragmentation prior to placement. Second, load control should
be treated as a multi-objective optimization among distortion, probability of detection, and
endto-end throughput; here, STC and wet-paper mechanisms are appropriate. Third, under an
active-warden model, JPEG recompression, scaling, and cropping must be taken into account,
which dictates integrating error-correction and low-visibility synchronization markers.
Imperceptibility assessment should combine classical quality measures (PSNR/SSIM) with
testing via SRM/SRNet detectors and constructing ROC/AUC curves to verify Type-I/II errors
and the operating point of the system. Particular attention should be paid to domain mismatch
across datasets and sensors; regularizing the cost map and employing stochastic placement
improve generalization to “unseen” domains. Theoretical limits of the “capacity–detectability”
trade-off follow from analyzing the energy of changes in residual spaces and HE-induced
distortion constraints, yielding practical rules for parameter selection.</p>
      <p>In this work, we formalize and experimentally study a hybrid pipeline in which sensitive
messages are first encrypted by a scheme supporting addition and multiplication over
ciphertexts (an HE class with approximate operations), and then the ciphertexts are embedded
into an image carrier using a content-adaptive method with payload control. We present a
threat model that combines chosen-plaintext attack (CPA) at the cryptographic level with active
and passive steganalysis at the signal level, and we demonstrate a reference prototype on
commodity hardware.</p>
      <p>Experimentally, we show that for payloads ≤ 0.2 bpp high visual quality is preserved (PSNR ≳
44 dB), while end-to-end throughput exceeds 18 kbit/s; for imperceptibility evaluation we
employ both classical feature-based approaches and modern deep steganalysis.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1 Homomorphic Encryption</title>
        <p>We consider RLWE-based schemes—BFV/BGV for exact modular (integer) arithmetic and
CKKS for approximate real/complex arithmetic.</p>
        <p>Let Enck ( m ) — denote encryption under the secret key k. Homomorphism allows
computing polynomial functions f over ciphertexts without decryption:</p>
        <p>D eck ( Eval ( f , Enck ( m )))=f ( m ) .</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2 Image Steganography</title>
        <p>
          Image steganography [
          <xref ref-type="bibr" rid="ref11 ref12">11–14</xref>
          ] conceals data by introducing small modifications to pixel
intensities or transform coefficients subject to perceptual constraints.
        </p>
        <p>A content-adaptive placement rule is employed, prioritizing high-variance (edge) regions to
minimize detectability at a fixed payload (bits per pixel).</p>
        <p>Problem statement. Let X ={ xi }iN=1 — be the cover image (8- bit, N = MN pixels),
S={si }iN=1 with Si∈ {−1,0,1 } — the change vector, and the stego image Y = X + S.
The objective is to conceal a fixed payload R (bits per pixel) while minimizing perceptually
weighted distortion. The standard additive model is formalized as the following constrained
optimization problem:</p>
        <p>N
min ∑ pi|si|</p>
        <p>S i=1
s.t.</p>
        <p>N
∑ h3 ( pi)= R∗N
i=1
where ρi&gt;0 — denotes the cost of modifying pixel iii (lower near edges/high-variance regions,
pi — is the probability of changing that pixel;
higher on smooth areas), and</p>
        <p>p
h3 ( p )=−(1− p )∗log2 ⁡ 2 — is the ternary entropy that links local change probabilities to the
global payload R.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed Hybrid Method</title>
      <sec id="sec-3-1">
        <title>3.1 Threat Model and Goals</title>
        <p>Adversary. We consider a passive observer with access to the channel/storage who can
perform modern image steganalysis (feature-based models and CNN detectors). We additionally
account for a weakly active warden: JPEG recompression, rescaling, and minor image edits.
Cryptographic keys are assumed unavailable to the adversary.</p>
        <p>System goals.</p>
        <p> G1 (Cryptographic confidentiality): Ciphertexts embedded in the carriers must
remain secure at least in the CPA model; any information leakage is unacceptable even
if the embedding is detected.</p>
        <p> G2 (Low detectability): The probability of detecting the concealment should
remain low for a fixed payload (bits per pixel) when evaluated by modern detectors.</p>
        <p> G3 (Practicality): The implementation should provide acceptable end-to-end
throughput and resource consumption on commodity hardware.
3.2 System Pipeline</p>
        <p>1. Data preparation (preprocessing): format normalization, message segmentation, and
ancillary metadata.</p>
        <p>2. Homomorphic encryption: y = Enck ( x ) (a scheme supporting {+ , × } over ciphertexts).
3. Channel coding and framing: add ECC/CRC, synchronization markers, and pack into a
bitstream.</p>
        <p>4. Content-adaptive embedding into the image: embed the bitstream into the cover I to
obtain the stego image I ' according to the rule “more load in less noticeable regions.”
5. Transmission/storage: transport or archive I ' in the cyber environment.
6. Extraction and decryption: inverse framing, decoding, and, Deck ( y )
to recover x.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.3. Formal Steps</title>
        <p>Let y — denote the ciphertext bitstream after framing. Partition the image I into blocks
{Bi }. For each block, estimate perceptual importance (the larger it is, the more visible the
changes). A convenient choice is
cі=</p>
        <p>1
ε + σ i2
where σ i2- is the local variance within window Bi, ε &gt;0- is a stabilizer. (Alternative: based on
gradient energy.) ci=ε +∥ ∇ I ∥ i</p>
        <p>Placement rule. Distribute bits in ascending order of ci (i.e., first into blocks of lowest
salience) until the payload budget ρ (bits per pixel). is exhausted. Decoding performs the inverse
operations: locate positions, deframe, verify ECC/CRC, and perform HE decryption.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.4. Complexity</title>
        <p>HE- encryption/decryption: O ( n∗logn ) per vector (NTT/ FFT kernel; n — is the
polynomialmodulus degree / slot count). Time and memory are determined by the security parameters and
computational depth.</p>
        <p>Adaptive embedding/extraction: O (∣ I ∣ ) in the number of pixels/coefficients (local statistics
plus a single pass over the image).</p>
        <p>Dominant factor: HE parameters (modulus bit-lengths, number of levels, and—if used—
bootstrapping) govern the overall latency; the stego stage is linear and lightweight.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Security and Steganalysis</title>
      <p>Cryptographic security reduces to that of the underlying HE scheme (e.g., RLWE hardness).
Steganographic security is assessed using standard detectors (SRM+EC, SPAM). Payloads ≤ 0,2
bpp preserve PSNR ≥ 44 dB and reduce detectability at small sample sizes.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experimental Setup and Results</title>
      <sec id="sec-5-1">
        <title>5.1. Prototype and Execution Environment</title>
        <p>Language and libraries. Python 3.12;
image processing — NumPy, Pillow/scikit-image;
classification (for steganalysis) — scikit-learn;
embedding implementation — custom routines with a content-adaptive importance map and
STC (syndrome-trellis codes).</p>
        <p>HE layer. Interface to a mature library (e.g., SEAL/OpenFHE).</p>
        <p>HE latencies in the pipeline are set according to representative measurements for the chosen
parameters (polynomial degree n, modulus set Q, computation depth).</p>
        <p>Carrier format. 8-bit grayscale images; this simplifies analysis and ensures reproducible
results.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Data, Factors, and Variables</title>
        <p>Images. Resolutions 256 × 256, 512 × 512 and 1024 × 1024 ((to assess scaling).
Payload ρ. {0.05,0 .10,0 .15,0 .20 } bits per pixel (bpp).</p>
        <p>Cost map. Based on local variance (5 × 5 window) and/or gradient energy (Sobel);
stabilization ε =10−3.</p>
        <p>Error-control coding. Simple BCH (e.g., ( 255,191 , t =10 ) or
( 511,376 , t =21 ) — the choice depends on the target robustness to losses after
JPEG/rescaling)..</p>
        <p>HE-parameters. Security level ≥ 128 біт; for CKKS — n∈ {8192,16384 },
Q ≈ 200 – 220 bits; for BFV—an equivalent level. No bootstrapping (shallow circuits).</p>
      </sec>
      <sec id="sec-5-3">
        <title>5.3. Procedure and Metrics</title>
        <p>Procedure. For each (size, ρ) combination, perform: encryption → framing/coding →
content-adaptive embedding → transmission/storage → extraction → decoding → decryption.</p>
        <p>Quality. Mean PSNR and SSIM (mean ± SD).</p>
        <p>Imperceptibility. SPAM and SRM+EC evaluation: ROC/AUC, EER, and
FPR @ TPR=0.8 / 0.9; where feasible—SRNet on a subset.</p>
        <p>Robustness. After JPEG-75/90, 0.5 × scaling, and 10% cropping, report BER (bit error rate),
FER (frame error rate), and the fraction of fully recovered messages..</p>
        <p>Statistics. 95% confidence intervals (bootstrap); for comparisons—paired t-test (PSNR/SSIM)
and McNemar’s test (detection outcomes).</p>
      </sec>
      <sec id="sec-5-4">
        <title>5.4. Reproducibility and Limitations</title>
        <p>Reproducibility. Fix random seeds, log all parameters, and archive the run scripts.</p>
        <p>Limitations. End-to-end performance is dominated by HE latencies; the stego stage is linear
and considerably lighter. As ρ increases, detectability naturally rises—hence the focus on
ρ ≤ 0.2 б / пк.</p>
        <p>Fig 2 PSNR versus payload ratio for content-adaptive embedding (illustrative)
operations but uses a larger key (~768 KB). BFV and BGV provide exact integer arithmetic; BFV
has the smallest key (~512 KB) and is slightly faster (18.5 kb/s) than BGV (17.9 kb/s). TFHE
operates on Boolean gates at the bit level, with the largest keys (~850 KB) and the lowest speed
(~9.3 kb/s), so scheme choice should be guided by required operations and acceptable resource
costs.
6. Discussion</p>
        <p>add, mul
add, mul (approx.)</p>
        <p>add, mul
boolean gates
512
768
640
850</p>
        <p>The proposed hybrid approach combines two complementary properties: cryptographic
confidentiality via homomorphic encryption (HE) and transmission concealment via
steganography. Such a composition is appropriate in scenarios where even the presence of
ciphertext is undesirable and computations must be performed without revealing the
underlying data. The semantic security of HE (grounded in the hardness of RLWE/module-noise
problems) protects content, while steganographic imperceptibility minimizes the probability of
detecting the communication itself; however, overall system security is determined by the
weakest link and by correct composition (channel keying and synchronization, carrier selection,
and payload parameterization).</p>
        <p>From the standpoint of carrier quality, the results exhibit the canonical “capacity–
imperceptibility” trade-off. The empirical PSNR curve decreases almost linearly with increasing
payload—from ≈52 dB at ≈0.01 bpp to ≈42 dB at 0.30 bpp; a ≈44 dB threshold is maintained up to
~0.20 bpp, which corresponds to acceptable visual quality for most images. This is consistent
with steganalysis: at low payloads and small sample sizes, standard detectors (SPAM, SRM+EC)
have reduced discriminative power, whereas with increasing payload the statistical traces
become more pronounced. The practical takeaway is that the 0.1–0.2 bpp range strikes a balance
among capacity, quality, and low detectability.</p>
        <p>The performance of the HE pipeline bounds end-to-end throughput. Experimentally,
encryption latency grows nearly linearly with image size (≈30 ms at ~0.1 MPx to ≈410 ms at ~2.1
MPx), indicating the dominance of polynomial operations and NTT transforms. A scheme-level
comparison shows that CKKS delivers the highest throughput (~22.1 kb/s) for approximate
realvalued computation, whereas BFV/BGV on integers use smaller/comparable keys (≈512–640 KB)
with similar speeds (≈18–18.5 kb/s). TFHE, while gate-universal at the Boolean level, is
substantially slower (~9.3 kb/s) and requires larger keys (~850 KB), which constrains its use in
multimedia streaming scenarios. Consequently, scheme selection should be aligned with data
type and required operations (exact integer vs. approximate real) as well as hardware
constraints.</p>
        <p>The robustness of the embedding channel is governed by in-transit transforms (JPEG
recompression, noise, scaling, cropping). Using BCH coding improves extraction reliability but
reduces effective capacity and may accentuate statistical artifacts. To increase robustness to
lossy transforms, it is advisable to move from the pixel domain to transform domains
(DCT/DWT) with content-adaptive distortion masks and modern distortion-minimization
schemes (e.g., the S-UNIWARD/HILL families or STC).</p>
        <p>From a threat perspective, it is important to distinguish passive and active wardens. Against
a passive warden (classical detectors), controlled payloads and content adaptation are effective.
Against an active warden (who deliberately modifies media), one needs: (i) robust embedding
domains, (ii) high-gain error-correcting codes, and (iii) resynchronization along with markers
that preserve imperceptibility. Metadata hygiene is also essential: the HE parameter set
(degrees, moduli, scales) and carrier-selection patterns can form a “fingerprint,” which should be
randomized.</p>
        <p>The study has several limitations: (1) the use of grayscale images (generalization to
color/video requires modeling inter-channel correlations); (2) no evaluation against adaptive
neural steganalyzers; (3) limited hardware optimization of HE (no GPU/FPGA); and (4) an
informal composition security model for the HE–steganography coupling. In addition, large key
sizes and ciphertext expansion in HE impose memory and storage requirements that matter for
embedded systems.
7. Conclusion</p>
        <p>1. The study demonstrates the rationale for combining homomorphic encryption with
steganography: the former provides semantic confidentiality of the data, while the latter
conceals the very fact of exchange, yielding a dual protective contour [15].</p>
        <p>2. The system’s aggregate robustness is determined by the weakest link in the
composition; critical factors include correct channel synchronization, randomized carrier
selection, and payload control to avoid stable “fingerprints” and patterns.</p>
        <p>3. Experiments confirm the canonical capacity–imperceptibility trade-off: as payload
increases, PSNR decreases nearly linearly; for ~0.10–0.20 bpp, PSNR can be maintained at ≳44 dB
and detectability by standard detectors (SPAM, SRM+EC) remains low for small sample sizes.</p>
        <p>4. The computational cost of HE scales almost linearly with image size, consistent with the
dominance of NTT/polynomial operations; this enables performance extrapolation to larger
carriers and planning admissible delays.</p>
        <p>5. Scheme selection must be task-oriented: CKKS is preferable for approximate real-valued
computations owing to higher throughput; BFV/BGV are suitable for exact integers with
moderate key sizes; TFHE, despite gate-level universality, lags in speed and memory efficiency.</p>
        <p>6. Employing error-correcting codes (notably BCH) increases the probability of correct
extraction but reduces effective capacity and may accentuate statistical artifacts; optimal
parameters should be set empirically.</p>
        <p>7. To enhance robustness to lossy transforms (JPEG, rescaling, noise), it is advisable to
embed in transform domains (DCT/DWT) using content-adaptive distortion maps and modern
minimization schemes (STC, UNIWARD/HILL families).</p>
        <p>8. Practical guidelines: keep the payload within 0.10–0.20 bpp; randomize embedding
parameters and carrier selection; align HE parameters (polynomial degree, moduli, scales) with
target latency and memory constraints.</p>
        <p>9. Overall, the results indicate that the hybrid approach is technologically viable for secure
covert exchange in telecommunication systems, providing predictable detection risk and
acceptable performance given careful HE parameterization and adaptive embedding.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.
[13] Image security using steganography and cryptographic techniques / R. Nivedhitha, T.</p>
      <p>Meyyappan // International Journal of Engineering Trends and Technology. – 2012.</p>
      <p>Volume 3. Issue 3. ISSN: 2231-5381. P. 366–371.
[14] Crypto-steganographic LSB-based system for AES-encrypted data / M. Abu-Alhaija //
(IJACSA) International Journal of Advanced Computer Science and Applications. – 2019. –
Volume 10. Issue 10. P. 55–60.
[15] User authentication method information and telecommunication systems based on
cascading multimodal biometric identification/ [V. Trysnyuk, K. Smetanin, I. Humeniuk, O.
Samchyshyn, V. Shumeiko, T. Trysnyuk] // 1st International Workshop on Information
Technologies: Theoretical and Applied Problems, Ternopil, Ukraine, November 16, 2021. –
P. 63 - 72</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Gentry</surname>
            <given-names>C.</given-names>
          </string-name>
          <article-title>Fully homomorphic encryption using ideal lattices</article-title>
          .
          <source>Proceedings of the 41st ACM Symposium on Theory of Computing (STOC)</source>
          .
          <year>2009</year>
          :
          <fpage>169</fpage>
          -
          <lpage>178</lpage>
          . doi:
          <volume>10</volume>
          .1145/1536414.1536440.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Cheon</surname>
            <given-names>JH</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            <given-names>Y.</given-names>
          </string-name>
          <article-title>Homomorphic encryption for arithmetic of approximate numbers</article-title>
          . In:
          <string-name>
            <surname>Takagi</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peyrin</surname>
            <given-names>T</given-names>
          </string-name>
          , eds.
          <source>Advances in Cryptology - ASIACRYPT 2017. Lecture Notes in Computer Science</source>
          , vol.
          <volume>10624</volume>
          . Cham: Springer;
          <year>2017</year>
          :
          <fpage>409</fpage>
          -
          <lpage>437</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -70694-8_
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Li</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Micciancio</surname>
            <given-names>D</given-names>
          </string-name>
          .
          <article-title>On the Security of Homomorphic Encryption on Approximate Numbers</article-title>
          .
          <source>In: Advances in Cryptology - EUROCRYPT 2021. Lecture Notes in Computer Science</source>
          , vol.
          <volume>12696</volume>
          . Cham: Springer;
          <year>2021</year>
          :
          <fpage>648</fpage>
          -
          <lpage>677</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5_
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Fridrich</surname>
            <given-names>J.</given-names>
          </string-name>
          <article-title>Steganography in Digital Media: Principles, Algorithms,</article-title>
          and Applications. Cambridge: Cambridge University Press;
          <year>2009</year>
          . doi:
          <volume>10</volume>
          .1017/CBO9781139192903.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Holub</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Designing steganographic distortion using directional filters</article-title>
          .
          <source>In:2012 IEEE International Workshop on Information Forensics and Security (WIFS)</source>
          .
          <year>2012</year>
          :
          <fpage>234</fpage>
          -
          <lpage>239</lpage>
          . doi:
          <volume>10</volume>
          .1109/WIFS.
          <year>2012</year>
          .
          <volume>6412655</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Holub</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Universal distortion function for steganography in an arbitrary domain</article-title>
          .
          <source>EURASIP Journal on Information Security</source>
          .
          <year>2014</year>
          ;
          <year>2014</year>
          (
          <article-title>1):1</article-title>
          . doi:
          <volume>10</volume>
          .1186/
          <fpage>1687</fpage>
          - 417X-2014-1.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Filler</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Judas</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Minimizing additive distortion in steganography using syndrome-trellis codes</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          .
          <year>2011</year>
          ;
          <volume>6</volume>
          (
          <issue>3</issue>
          ):
          <fpage>920</fpage>
          -
          <lpage>935</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIFS.
          <year>2011</year>
          .
          <volume>2134094</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Fridrich</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kodovský</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Rich models for steganalysis of digital images</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          .
          <year>2012</year>
          ;
          <volume>7</volume>
          (
          <issue>3</issue>
          ):
          <fpage>868</fpage>
          -
          <lpage>882</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIFS.
          <year>2012</year>
          .
          <volume>2190402</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Boroumand</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fridrich</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Deep residual network for steganalysis of digital images</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          .
          <year>2019</year>
          ;
          <volume>14</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1181</fpage>
          -
          <lpage>1193</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIFS.
          <year>2018</year>
          .
          <volume>2871749</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Halevi</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoup</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Algorithms in HElib</article-title>
          . In:
          <string-name>
            <surname>Garay</surname>
            <given-names>JA</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gennaro</surname>
            <given-names>R</given-names>
          </string-name>
          , eds.
          <source>Advances in Cryptology - CRYPTO 2014. Lecture Notes in Computer Science</source>
          , vol.
          <volume>8616</volume>
          . Berlin, Heidelberg: Springer;
          <year>2014</year>
          :
          <fpage>554</fpage>
          -
          <lpage>571</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -44371-2_
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>Information Encryption Method based on a Combination of Steganographic and Cryptographic Algorithm's Features /</article-title>
          [V.
          <string-name>
            <surname>Trysnyuk</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Smetanin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Humeniuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Samchyshyn</surname>
          </string-name>
          , T. Trysnyuk] // Cybersecurity Providing in Information and Telecommunication
          <string-name>
            <surname>Systems</surname>
            <given-names>II</given-names>
          </string-name>
          , Kyiv, Ukraine, October
          <volume>26</volume>
          ,
          <year>2021</year>
          . - P.
          <fpage>150</fpage>
          -
          <lpage>159</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Cryptographic</surname>
            <given-names>steganography / V.</given-names>
          </string-name>
          <string-name>
            <surname>Yadav</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Ingale</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Sapkal</surname>
            , G. Patil // Sundarapandian et al. (Eds) : CCSEIT,
            <given-names>DMDB</given-names>
          </string-name>
          , ICBB, MoWiN, AIAP - 2014. P.
          <volume>17</volume>
          -
          <fpage>23</fpage>
          . DOI:
          <volume>10</volume>
          .5121/csit.
          <year>2014</year>
          .
          <volume>4803</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>