STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Article Sidebar
Open full text
Issue Vol. 8 No. 4 (2018)
-
THE SOURCES OF RADIATION IN THE SHORT-WAVE RANGE ON THE BASIS OF II-VI HETEROLAYERS
Mikhail Slyotov, Alexey Slyotov4-7
-
ANALYSIS OF THE SEPARATION METHODS OF OPTICAL SPECTRA FOR INDIVIDUAL COMPONENTS
Viktor Makhniy, Oksana Kinzerska, Illia Senko8-11
-
FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE
Olexander Beley12-15
-
MULTICRITERIA SELECTION OF THE OPTIMAL DESIGN OPTIONS OF TELECOMMUNICATION FACILITIES
Valeriy Bezruk, Daria Chebotareva, Yulia Skoryk16-19
-
DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR
Volodymyr Barannik, Oleg Shatun, Dmitriy Barannik, Veronika Kobtseva20-23
-
STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Anna Romanova, Sergiy Toliupa24-27
-
BUILDING INTRUSION DETECTION SYSTEMS BASED ON THE BASIS OF METHODS OF INTELLECTUAL ANALYSIS OF DATA
Serhii Toliupa, Mykola Brailovskyi, Ivan Parkhomenko28-31
-
OVERVIEW OF APPLICATIONS OF WIRE MEDIUM IN RADIO ENGINEERING MEANS
Mykola Khobzei, Dmytro Vovchuk, Magdalena Michalska32-35
-
IMPROVEMENT OF FIDELITY OF MOVING OBJECTS CLASSIFICATION IN GUARD SIGNALING COMPLEXES WITH SEISMIC SENSORS
Bohdan Volochiy, Mykhailo Zmysnyi, Leonid Ozirkovskyy, Volodymyr Onyshchenko, Yuriy Salnyk36-39
-
DEVELOPMENT OF THE REMOTE-PILOTED VEHICLE ALGORITHMIC SUPPORT AND ON-BOARD NAVIGATION COMPLEX STRUCTURE
Mykola Mykyjchuk, Volodymyr Markiv40-43
-
METHOD OF SAFE LANDING THE EMERGENCY QUADROCOPTER
Bohdan Blagitko, Yuriy Mochulsky44-47
-
IMPROVEMENT OF METHODS OF MOTION COMPENSATION OF DYNAMIC OBJECTS MOVING IN VIDEO STREAM OF THE VIDEOCONFERENCING SYSTEM
Volodymyr Barannik, Mykola Dvorsky, Valeriy Barannik, Viktoria Himenko, Anton Sorokun48-51
-
INFORMATION SYSTEM FOR ASSESSING THE PROFESSIONAL ACTIVITIES COMPLEXITY – THEORETICAL AND PRACTICAL ASPECTS OF IMPLEMENTATION
Oleg Zaritskyi52-55
-
SUN TRANSITS IN GEO SATELLITE SYSTEMS IN THE ASPECT OF RADIO WAVES PROPAGATION
Jacek Łukasz Wilk-Jakubowski56-59
-
INFLUENCE OF MOBILE ROBOT CONTROL ALGORITHMS ON THE PROCESS OF AVOIDING OBSTACLES
Piotr Wójcicki, Paweł Powroźnik, Kamil Żyła, Stanisław Grzegórski60-63
-
MODIFICATIONS OF MAXIMUM POWER POINT TRACKING P&O METHOD FOR PHOTOVOLTAIC PANEL
Piotr Kozierski, Adam Owczarkowski, Marcin Lis, Dariusz Horla64-67
Archives
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
-
Vol. 8 No. 4
2018-12-16 16
-
Vol. 8 No. 3
2018-09-25 16
-
Vol. 8 No. 2
2018-05-30 18
-
Vol. 8 No. 1
2018-02-28 18
-
Vol. 7 No. 4
2017-12-21 23
-
Vol. 7 No. 3
2017-09-30 24
-
Vol. 7 No. 2
2017-06-30 27
-
Vol. 7 No. 1
2017-03-03 33
-
Vol. 6 No. 4
2016-12-22 16
-
Vol. 6 No. 3
2016-08-08 18
-
Vol. 6 No. 2
2016-05-10 16
-
Vol. 6 No. 1
2016-02-04 16
Main Article Content
DOI
Authors
Abstract
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.
Keywords:
References
Agranovskiy A. V., Balakin A. V., Gribunin V. G., Sapozhnikov S. A.: Steganografiya, tsifrovyye vodyanyye znaki i steganoanaliz. Vuzovskaya kniga, Moscow 2009.
Ali A. E.: A New Text Steganography Method by Using Non-Printing Unicode Characters. Eng& Tech. Journal 28 (1), 2010, 72–83.
Chekhovskyy S.: Sovremennye metody skrytoy peredachy ynformatsyy putem prohrammnoho upravlenyya yzluchenyem kompʹyutery. Pravove, normatyvne ta metrolohichne zabezpechennya systemy zakhystu informatsiyi v Ukrayini. 2003.
Echo Data Hiding (html): http://www.slidefinder.net/a/audio_steganography_echo_data_hiding/24367218.
Ferreira A. M.: An Overview on Hiding and Detecting Stego-data in Video Streams. University of Amsterdam. System & Network Engineering – Research Project II, 2015.
Fridrich J., Goljan M., Soukal D.: Searching for the Stego Key. Proc. SPIE 5306, 2004 [doi: 10.1117/12.521353].
Genkin D., Shamir A., Tromer E.: RSA key extraction via low-bandwidth acoustic cryptoanalysis. Tel Aviv University. 2013.
Konakhovich G. F., Puzyrenko A. Yu.: Computer steganography. Theory and practice with Mathcad. MK-Press, Kyiv 2006.
Kuhn M. G., Anderson R.: Soft Tempest: Hidden data transmission using electromagnetic emanations. University of Cambridge, Computer Laboratory, New Museum Site, 1998.
League C.: An overview of digital steganography, particularly within images, for the computationally curious. Long Island University 2015: https://www.youtube.com/watch?v=-7FBPgQDX5o.
Romanova A., Toliupa S.: Perspective steganographic solutions and their application. Proceedings of the VII Inter University Conference Engineer of XXI Century, volume 2, 2017, 269–278.
Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print. Electronic Frontier Foundation October 2005: https://www.eff.org/press/archives/2005/10/16.
Zorin Ye.Ye., Chichvarin N.V.: Steganografiya v SAPR. Uchebnoye posobiye. MGTU im. N.E. Baumana. Moscow.
Article Details
Abstract views: 275
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
