Steganographic methods of information protection in telecommunication systems special purpose
ŠŠ°Š½ŃŠ°Š¶ŠøŃŃŃŃ...
ŠŠ°ŃŠ°
2024
ŠŠ²ŃŠ¾ŃŠø
ORCID
DOI
ŠŠ°ŃŠŗŠ¾Š²ŠøŠ¹ ŃŃŃŠæŃŠ½Ń
Š ŃŠ²ŠµŠ½Ń Š“ŠøŃŠµŃŃŠ°ŃŃŃ
ŠØŠøŃŃ ŃŠ° Š½Š°Š·Š²Š° ŃŠæŠµŃŃŠ°Š»ŃŠ½Š¾ŃŃŃ
Š Š°Š“Š° Š·Š°Ń ŠøŃŃŃ
Š£ŃŃŠ°Š½Š¾Š²Š° Š·Š°Ń ŠøŃŃŃ
ŠŠ°ŃŠŗŠ¾Š²ŠøŠ¹ ŠŗŠµŃŃŠ²Š½ŠøŠŗ
Š§Š»ŠµŠ½Šø ŠŗŠ¾Š¼ŃŃŠµŃŃ
ŠŠøŠ“Š°Š²ŠµŃŃ
Impress
ŠŠ½Š¾ŃŠ°ŃŃŃ
ŠŠæŠøŃ
ŠŠ»ŃŃŠ¾Š²Ń ŃŠ»Š¾Š²Š°
steganography, information confidentiality, information protection
ŠŃŠ±Š»ŃŠ¾Š³ŃŠ°ŃŃŃŠ½ŠøŠ¹ Š¾ŠæŠøŃ
IbrŠ°himov B. G. Steganographic methods of information protection in telecommunication systems special purpose / B. G. IbrŠ°himov, K. M. Tahirova // Š”ŃŃŠ°ŃŠ½Ń Š½Š°ŠæŃŃŠ¼Šø ŃŠ¾Š·Š²ŠøŃŠŗŃ ŃŠ½ŃŠ¾ŃŠ¼Š°ŃŃŠ¹Š½Š¾-ŠŗŠ¾Š¼ŃŠ½ŃŠŗŠ°ŃŃŠ¹Š½ŠøŃ
ŃŠµŃ
Š½Š¾Š»Š¾Š³ŃŠ¹ ŃŠ° Š·Š°ŃŠ¾Š±ŃŠ² ŃŠæŃŠ°Š²Š»ŃŠ½Š½Ń : ŃŠµŠ·Šø Š“Š¾Šæ. 14-Ń Š¼ŃŠ¶Š½Š°Ń. Š½Š°ŃŠŗ.-ŃŠµŃ
Š½. ŠŗŠ¾Š½Ń., 25-26 ŠŗŠ²ŃŃŠ½Ń 2024 Ń., ŠŠ°ŠŗŃāŠ„Š°ŃŠŗŃŠ²āŠŠøŠ»ŃŠ½Š° : [Ń 2 Ń.]. Š¢. 2 : ŃŠµŠŗŃŃŃ 3-6 / ŠŠ°Ń. ŃŠ½-Ń Š¾Š±Š¾ŃŠ¾Š½Šø ŠŠ·ŠµŃŠ±Š°Š¹Š“Š¶Š°Š½ŃŃŠŗŠ¾Ń Š ŠµŃŠæŃŠ±Š»ŃŠŗŠø [ŃŠ° ŃŠ½.]. ā Š„Š°ŃŠŗŃŠ² : Impress., 2024. ā Š”. 10-11.