Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Betterment of Business Communication with Steganography and Cryptography


     

   Subscribe/Renew Journal


One of the biggest problems that most companies have regarding security technology is that they don't develop a strategy for implementation. Many companies seem to have the attitude that implementing a single technology, such as firewalls, will make them secure. In reality, just putting a firewall in place is not enough: That firewall has to be designed and configured properly for it to do its job successfully, and it must be used in concert with other security measures. And all these security measures must be properly integrated with the current network.

Secure communication is no different from information security: You have to pick the right tools, implement them properly, and train users to use them in their daily work.

This paper will look at the kind of assessment involved in developing a secure communications strategy that might include stego and crypto.


Keywords

Steganography, Cryptography, Communication, Public Key Steganography, Private Key Steganography, Steganalysis
Subscription Login to verify subscription
User
Notifications
Font Size


  • Cole, Eric, Hiding in Plain Sight:Steganography and the Art of Covert Communication, Wiley Publishing Inc.,2003, pp.217 – 222.
  • Salomon, D. Data Privacy and Security. Springer-Verlag, New York, Inc., 2003.pp.362
  • R.J. Anderson, “Stretching the Limits of Steganography.” in Information Hiding, Springer Lecture Notes in Computer Science v 1174 (May/June 1996), pp 39–48.
  • Craver, Scott, On Public-key Steganography in the Presence of an Active Warden, 1996
  • Fridrich, J., Goljan, M., and Hogea, D. (2002). Steganalysisof jpeg images: Breaking the f5 algorithm. In Proc.of In 5th International Workshop on Information Hiding.
  • Johnson, N. F. and Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2):26–34.
  • Kerckhoffs, A. (1883). La cryptographie militaire. Journal des Sciences Militaries, 9th series(IX):5–38.
  • Kharrazi, M., Sencar, H. T., and Memon, N. (2004). Image steganography: Concepts and practice. In WSPC Lecture Notes Series.
  • Menezes, A., van Oorschot, P., and Vanstone, S. (1996). Handbook of Applied Cryptography. CRC Press.
  • Provos, N. and Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE SECURITY & PRIVACY.
  • Shannon, C. E. (1949). Communication theory of secrecy system. Bell Syst. Tech. J., 28:656–715.
  • Simmons, G. J. (1984). The prisoners’ problem and the subliminal channel. In Advances in Cryptology: Proceedings of Crypto 83, pages 51–67. Plenum Press.
  • Westfeld, A. (2001). F5-a steganographic algorithm: High capacity despite better steganalysis. In Proc. 4th Int’l Workshop Information Hiding, pages 289–302.
  • Westfeld, A. and Pfitzmann, A. (1999). Attacks on steganographic systems. In Proc. Information Hiding 3rd Int’ Workshop, pages 61–76.
  • William Stallings; Cryptography and Network Security: Principals and Practice, Prentice Hall international, Inc.; 2002.
  • Oded Goldreich; Foundations of Cryptography, China Machine Press, 2003.
  • Jae K. Shim, Anique A. Qureshi and Joel G. Siegel, The International Handbook of Computer Security,Glenlake Publishing Company, Ltd., Glenlake Publishing Company, Ltd., 2000.
  • Ma Shilong, Emad S. Ibrahim, and Hala A. Bayoumy, An introduction to Admire in China (Advanced Multimedia Interactive Real-time Environment), ICAIA’ 2003, proceedings of the 11th International Conference on Artificial Intelligence Applications, Cairo, Egypt, February, 2003.
  • Emad S. Ibrahim and Hala A. Bayoumy, “Novel Authentication Approach Using The MSPC”, the Proceedings of the 7th IEEE International Conference on Intelligent Engineering Systems, INES2003, Assiut - Luxor, Egypt, March, 2003.
  • http://www.jjtc.com/stegdoc/stegdoc.html
  • Stefan Katzenbeisser, Fabien A. P. Petitcolas, “Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, 2000

Abstract Views: 388

PDF Views: 2




  • Betterment of Business Communication with Steganography and Cryptography

Abstract Views: 388  |  PDF Views: 2

Authors

Abstract


One of the biggest problems that most companies have regarding security technology is that they don't develop a strategy for implementation. Many companies seem to have the attitude that implementing a single technology, such as firewalls, will make them secure. In reality, just putting a firewall in place is not enough: That firewall has to be designed and configured properly for it to do its job successfully, and it must be used in concert with other security measures. And all these security measures must be properly integrated with the current network.

Secure communication is no different from information security: You have to pick the right tools, implement them properly, and train users to use them in their daily work.

This paper will look at the kind of assessment involved in developing a secure communications strategy that might include stego and crypto.


Keywords


Steganography, Cryptography, Communication, Public Key Steganography, Private Key Steganography, Steganalysis

References