STEGANOGRAPHY – THEORY AND PRACTICE

Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part o...

Full description

Bibliographic Details
Main Authors: Vladimir Barannik, Bogdan Gorodetsky, Natalia Barannik
Format: Article
Language:English
Published: Lublin University of Technology 2019-03-01
Series:Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Subjects:
Online Access:https://ph.pollub.pl/index.php/iapgos/article/view/781
id doaj-7bb5279832b54afc9c9be9e07972da78
record_format Article
spelling doaj-7bb5279832b54afc9c9be9e07972da782020-11-25T03:15:24ZengLublin University of TechnologyInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 2083-01572391-67612019-03-019110.5604/01.3001.0013.0910STEGANOGRAPHY – THEORY AND PRACTICEVladimir Barannik0Bogdan Gorodetsky1Natalia Barannik2University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACSUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACSUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems. https://ph.pollub.pl/index.php/iapgos/article/view/781cyber attackstelecommunications equipmentcyber securityinformation hiding
collection DOAJ
language English
format Article
sources DOAJ
author Vladimir Barannik
Bogdan Gorodetsky
Natalia Barannik
spellingShingle Vladimir Barannik
Bogdan Gorodetsky
Natalia Barannik
STEGANOGRAPHY – THEORY AND PRACTICE
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
cyber attacks
telecommunications equipment
cyber security
information hiding
author_facet Vladimir Barannik
Bogdan Gorodetsky
Natalia Barannik
author_sort Vladimir Barannik
title STEGANOGRAPHY – THEORY AND PRACTICE
title_short STEGANOGRAPHY – THEORY AND PRACTICE
title_full STEGANOGRAPHY – THEORY AND PRACTICE
title_fullStr STEGANOGRAPHY – THEORY AND PRACTICE
title_full_unstemmed STEGANOGRAPHY – THEORY AND PRACTICE
title_sort steganography – theory and practice
publisher Lublin University of Technology
series Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
issn 2083-0157
2391-6761
publishDate 2019-03-01
description Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.
topic cyber attacks
telecommunications equipment
cyber security
information hiding
url https://ph.pollub.pl/index.php/iapgos/article/view/781
work_keys_str_mv AT vladimirbarannik steganographytheoryandpractice
AT bogdangorodetsky steganographytheoryandpractice
AT nataliabarannik steganographytheoryandpractice
_version_ 1724639794175148032