“…There have appeared a number of papers devoted to the hiding of information in the data of wireless sensor networks, which is the most urgent for the mining sector. As an example, we will note the papers [ 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ]. Within the limits of the present research, similar methods can be used for the authentication of mining service machine data.…”