“Mathematical model of steganography using suboptimal decisions in data compression algorithms” (2025) Information systems and technologies security, 1(9), pp. 54–60. doi:10.17721/ISTS.2025.9.54-60.