Home Archive Organization Program News Contact
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 2, Issue 1, 2013
Pages: 379 - 390
None of above
See full issue

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Metrics and citations
Abstract views: 10
PDF Downloads: 0
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: >> Accepted: >> Published: 01.09.2013. None of above

Steganography - Advantages And Disadvantages

By
Boško Rodić ,
Boško Rodić

Društvo za informacionu bezbednost Srbije , Belgrade , Serbia

Milica Tepšić ,
Milica Tepšić

Banja Luka College , Banja Luka , Bosnia and Herzegovina

Radovan Korićanac
Radovan Korićanac

Služba za zajedničke poslove Vlade Republike Srpske , Banja Luka , Bosnia and Herzegovina

Abstract

Information follows the human race from its inception until today, and it will be covered as long as it exists. So the information is the most important asset in life, and therefore the most important asset of the business system. Information may be damaged, misused, stolen, destroyed ... the informational superiority of the holder of information is degraded, and struggle for and with information continuously runs. Information security is converted through a series of measures aiming to not allow this degradation, or reduce to a minimum (tolerable) measure. Regulating measures to protect the information we come to the encryption. Traditionally it (cryptographic) is realized through the encryption procedures, encryption, steganography and scrambling. This paper aims to show how steganography has a very efficient and powerful techniques that allow safe and hidden communication. As the primary methods will be use analysis, synthesis, induction, deduction, analogy. Steganography is characterized by the fact that (almost) does not imply that the cryptosystem is protecting specific information. Steganography has a long (pre) history. With the advent of the computer (information technology - IT) this type of encryption is becoming very important. There are examples of using steganography in terrorist acts. In this paper, besides stating traditional methods of crypto protection we focused on steganography. Also, using IT - the tools available, we performed a comparison of steganography with classical methods of crypto protection. And we draw some conclusions.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.