Abstract:
The article discusses the results of the most common methods of steganography. With the help of numerical simulation, the ability to resist steganalysis attacks at various stages related to the amount of information embedding was demonstrated. It was shown that adaptive methods of steganography can be considered the most acceptable.