“Application of Computer Vision Methods for Information Security” (2025) R&E-SOURCE, (s1), pp. 161–177. doi:10.53349/re-source.2025.is1.a1389.