This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Društvo za informacionu bezbednost Srbije , Belgrade , Serbia
Banja Luka College , Banja Luka , Bosnia and Herzegovina
Služba za zajedničke poslove Vlade Republike Srpske , Banja Luka , Bosnia and Herzegovina
Information follows the human race from its inception until today, and it will be covered as long as it exists. So the information is the most important asset in life, and therefore the most important asset of the business system. Information may be damaged, misused, stolen, destroyed ... the informational superiority of the holder of information is degraded, and struggle for and with information continuously runs. Information security is converted through a series of measures aiming to not allow this degradation, or reduce to a minimum (tolerable) measure. Regulating measures to protect the information we come to the encryption. Traditionally it (cryptographic) is realized through the encryption procedures, encryption, steganography and scrambling. This paper aims to show how steganography has a very efficient and powerful techniques that allow safe and hidden communication. As the primary methods will be use analysis, synthesis, induction, deduction, analogy. Steganography is characterized by the fact that (almost) does not imply that the cryptosystem is protecting specific information. Steganography has a long (pre) history. With the advent of the computer (information technology - IT) this type of encryption is becoming very important. There are examples of using steganography in terrorist acts. In this paper, besides stating traditional methods of crypto protection we focused on steganography. Also, using IT - the tools available, we performed a comparison of steganography with classical methods of crypto protection. And we draw some conclusions.
information, information superiority, information security, cryptographic protection, steganography
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.