TY - JOUR
T1 - Protecting seaport communication system by steganography based procedures
AU - Wiseman, Yair
PY - 2014
Y1 - 2014
N2 - Rival companies compete against each other in business and therefore they try to obtain data that is usually held in the hands of seaports. If a company succeeds to damage one of its rival companies, the company will increase in value. Therefore there is risk for any data in the hands of a port; in spite of this, there is no cybersecurity standard for the maritime industry or for enforcement agencies; despite the fact that the need of secure communication is indispensable. Still, using encrypted messages have a noteworthy disadvantage. Each person who sees the message recognizes that there is a cryptic message. This paper introduces a technique of Steganography, that is to say - transmitting encrypted messages in images compressed by the well known JPEG format. In point of fact, the system modifies the pictures a bit, but this modification is totally unnoticeable. The image seems to be an immaculate picture, while truly the picture does include some extra information.
AB - Rival companies compete against each other in business and therefore they try to obtain data that is usually held in the hands of seaports. If a company succeeds to damage one of its rival companies, the company will increase in value. Therefore there is risk for any data in the hands of a port; in spite of this, there is no cybersecurity standard for the maritime industry or for enforcement agencies; despite the fact that the need of secure communication is indispensable. Still, using encrypted messages have a noteworthy disadvantage. Each person who sees the message recognizes that there is a cryptic message. This paper introduces a technique of Steganography, that is to say - transmitting encrypted messages in images compressed by the well known JPEG format. In point of fact, the system modifies the pictures a bit, but this modification is totally unnoticeable. The image seems to be an immaculate picture, while truly the picture does include some extra information.
KW - We would like to encourage you to list your keywords in this section
UR - http://www.scopus.com/inward/record.url?scp=84905906643&partnerID=8YFLogxK
U2 - 10.14257/ijsia.2014.8.4.03
DO - 10.14257/ijsia.2014.8.4.03
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84905906643
SN - 1738-9976
VL - 8
SP - 25
EP - 36
JO - International Journal of Security and its Applications
JF - International Journal of Security and its Applications
IS - 4
ER -