STEGANOGRAPHY – THEORY AND PRACTICE
Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part o...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Lublin University of Technology
2019-03-01
|
Series: | Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska |
Subjects: | |
Online Access: | https://ph.pollub.pl/index.php/iapgos/article/view/781 |
id |
doaj-7bb5279832b54afc9c9be9e07972da78 |
---|---|
record_format |
Article |
spelling |
doaj-7bb5279832b54afc9c9be9e07972da782020-11-25T03:15:24ZengLublin University of TechnologyInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 2083-01572391-67612019-03-019110.5604/01.3001.0013.0910STEGANOGRAPHY – THEORY AND PRACTICEVladimir Barannik0Bogdan Gorodetsky1Natalia Barannik2University of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACSUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACSUniversity of Ivan Kozhedub Kharkiv National University of Air Force, Faculty/Department combat use and operation of ACS Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems. https://ph.pollub.pl/index.php/iapgos/article/view/781cyber attackstelecommunications equipmentcyber securityinformation hiding |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Vladimir Barannik Bogdan Gorodetsky Natalia Barannik |
spellingShingle |
Vladimir Barannik Bogdan Gorodetsky Natalia Barannik STEGANOGRAPHY – THEORY AND PRACTICE Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska cyber attacks telecommunications equipment cyber security information hiding |
author_facet |
Vladimir Barannik Bogdan Gorodetsky Natalia Barannik |
author_sort |
Vladimir Barannik |
title |
STEGANOGRAPHY – THEORY AND PRACTICE |
title_short |
STEGANOGRAPHY – THEORY AND PRACTICE |
title_full |
STEGANOGRAPHY – THEORY AND PRACTICE |
title_fullStr |
STEGANOGRAPHY – THEORY AND PRACTICE |
title_full_unstemmed |
STEGANOGRAPHY – THEORY AND PRACTICE |
title_sort |
steganography – theory and practice |
publisher |
Lublin University of Technology |
series |
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska |
issn |
2083-0157 2391-6761 |
publishDate |
2019-03-01 |
description |
Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.
|
topic |
cyber attacks telecommunications equipment cyber security information hiding |
url |
https://ph.pollub.pl/index.php/iapgos/article/view/781 |
work_keys_str_mv |
AT vladimirbarannik steganographytheoryandpractice AT bogdangorodetsky steganographytheoryandpractice AT nataliabarannik steganographytheoryandpractice |
_version_ |
1724639794175148032 |