This requires information to be assigned a security classification where the top secret data need highly secure software and procedures to deal with this data and assign different level of authorised parties such as some parties authorised to disclose the data only while another have the ability to change it. The general taxonomy for the security attribute depends on the context in which the attribute is addressed.
Historically, there have been three main areas which have addressed security: In each of these cases, different aspects of security were stressed and the definition of individual security attributes depended upon the stressed security aspects. Where the use of the information security in government and military applications; the disclosure of information is the primary risk and to be averted at all costs.
While in banking, finance and business-related computing, the security emphasis is on the protection of assets. Where the disclosure is an important risk, the far greater risk is the unauthorized modification of information; as well as the academic and scientific computing application, the main security emphasis is on protection from unauthorized use of resources.
- Authors of the Impossible: The Paranormal and the Sacred.
- Data Privacy and Security..
- La Justice de Dieu est révélée dans lépître aux Romains - Notre SEIGNEUR Qui devient la Justice De DIEU (II) (French Edition).
In order to achieve the information security goal there are number of methods which are used for information security. The cryptography is one of the methods which are used to keep the information or the data in safe against any disclose to the data. There are some systems designed to protect the data or information which uses the cryptography technique as a primitive. Cryptography is the art and science of protecting information from undesirable individuals by converting it into a form non-recognizable by its attackers while stored and transmitted Kessler, ; Abomhara et al.
Data cryptography mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or unintelligible during transmission or storage. The main goal of cryptography is keeping data secure form unauthorized attackers. The reverse of data encryption is data Decryption.
- THE WORDS OF JESUS. Jesus Teachings, In His Own Words?
- Product details.
- The Final Chapter on the Assassination of JFK.
In modern days cryptography is no longer limited to secure sensitive military information but recognized as one of the major components of the security policy of any organization and considered industry standard for providing information security, trust, controlling access to resources and electronic financial transactions. Since, cryptography first known usage in ancient Egypt it has passed through different stages and was affected by any major event that affected the way people handled information.
In the World War II for instance cryptography played an important role and was a key element that gave the allied forces the upper hand and enables them to win the war sooner, when they were able to dissolve the Enigma cipher machine which the Germans used to encrypt their military secret communications Abomhara et al. Original data that to be transmitted or stored is called plaintext, the one that can be readable and understandable either by a person or by a computer.
Whereas the disguised data so-called cipher-text, which is unreadable, neither human nor machine can properly process it until it is decrypted. A system or product that provides encryption and decryption is called cryptosystem Abomhara et al. Cryptosystem uses an encryption algorithms which determines how simple or complex the encryption process will be, the necessary software component and the key usually a long string of bits , which works with the algorithm to encrypt and decrypt the data Kessler, In the 19th century, a famous theory about the security principle of any encryption system has been proposed by Kerchhoff.
This theory has become the most important principle in designing a cryptosystem for researchers and engineers. Kirchhoff observed that the encryption algorithms are supposed to be known to the opponents White, The security level of an encryption algorithm is measured by the size of its key space Abomhara et al. The larger size of the key space is, the more time the attacker needs to do the exhaustive search of the key space and thus the higher the security level is.
The decrypt for these data or information is done only if the correct key is at hand. One of the most common primitives in computer security is a cryptosystem, which specifies exactly how to encrypt data with a key to produce cipher-text. Cipher-text can be thought of as data locked inside a box; the encryption makes it intractable to recover the original data from the box without the correct key.
There are some standards methods which is used with cryptography such as secret key symmetric , public key asymmetric , digital signature and hash function. With secret key cryptography, a single key is used for both encryption and decryption. The sender uses the key or some set of rules to encrypt the plaintext and sends the cipher-text to the receiver. The receiver applies the same key or rule set to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.
Public-key cryptography has been said to be the most significant new development in cryptography in the last years. Their study described a two-key crypto system in which two parties could engage in a secure communication over a insecure communications channel without having to share a secret key Zaidan and Zaidan, The using for digital signature came from the need of ensuring the authentication is the data came from the original sender?
Or someone has modified it? The digital signature is more like stamp or signature of the sender should be unique for each sender which is embedded together with the data and encrypts it with the private key in order to send it to the other party. In addition, the signature assures that any change made to the data that has been signed is easy to detect by the receiver. The hash function is a one way encryption, the hash function is a well defined procedure or mathematical formula that represents a small size of bits which is generated from a large sized file, the result of this function can be called hash code or hashes.
The generating of hash code is faster than other methods which make it more desired for authentication and integrity. Cryptographic hash functions are much used for digital signature s and cheap constructions are highly desirable Bellare and Rogaway, The use of cryptographic hash functions for message authentication has become a standard approach in many applications, particularly internet security protocols Bellare et al.
The word steganography comes from the Greek Steganos, which mean covered or secret and graphy mean writing or drawing. Therefore, steganography means, literally, covered writing. Steganography is the art and science of hiding information such that its presence cannot be detected and a communication is happening Al-Azawi and Fadhil, Secret information is encoding in a manner such that the very existence of the information is concealed.
Product description
Paired with existing communication methods, steganography can be used to carry out hidden exchanges. For example ancient Greece used methods for hiding messages such as hiding in the field of steganography, some terminology has developed. The adjectives cover, embedded and stego were defined at the information hiding workshop held in Cambridge, England Naji et al. The term cover refers to description of the original, innocent massage, data, audio, video and so on. Steganography is not a new science; it dates back to ancient times.
Product description
Another ingenious method was to shave the head of a messenger and tattoo a message or image on the messenger head. After allowing his hair to grow, the message would be undetected until the head was shaved again. While the Egyptian used illustrations to conceal message. Hidden information in the cover data is known as the embedded data and information hiding is a general term encompassing many sub disciplines, is a term around a wide range of problems beyond that of embedding message in content Naji et al.
The term hiding here can refer to either making the information undetectable or keeping the existence of the information secret Jalab et al. Information hiding is a technique of hiding secret using redundant cover data such as images, audios, movies, documents, etc. This technique has recently become important in a number of application areas.
Encryption - Wikipedia
For example, digital video, audio and images are increasingly embedded with imperceptible marks, which may contain hidden signatures or watermarks that help to prevent unauthorized copy. It is a performance that inserts secret messages into a cover file, so that the existence of the messages is not apparent. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data.
It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. If a steganography method causes someone to suspect the carrier medium, then the method has failed. The term of hide information is the process of covering the secrete message or information multimedia files to make sure there is no other party can disclose or altering it Karzenbeisser and Perircolas, ; Majeed et al. Under this topic we can drive two techniques which are used to hide information one is digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove, the signal may be audio, pictures, video or text files; its mostly used for demonstrate the intellectual property rights purpose such as adding copy right logo or text author signature for multimedia files.
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
Data privacy and security
The digital multimedia files steganography uses code fields for unimportant bits as places to hide encoded messages or images. While such manipulation might slightly alter the quality of the original image, it generally goes unnoticed by the naked eye. During the process characteristics of these methods are to change in the structure and features so as not to be identifiable by human eye.
Capacity, confidentiality and robustness, are the three main aspects affecting steganography and its usefulness. Capacity refers to the amount of data bits that can be hidden in the cover medium. Confidentiality relates to the ability of the discloser to figure the hidden information easily. Robustness is concerned about the resist possibility of modifying or destroying the unseen data. Since, the advent of computers there has been a vast dissemination of information, some of which needs to be kept private, some of which doesn't.
The information may be hidden in two basic ways cryptography and steganography. The methods of cryptography does not conceal the presence of secret information but render it unintelligible to outsider by various transformations of the information that is to be put into secret form, while methods of Steganography conceal the very existence of the secret information.
The following table has shown the comparison between cryptography and steganography. Table 1 shows that the cryptography and the hiding information technologies have counter advantages and disadvantages. Basically, the purpose of cryptography and steganography is to provide secret communication. However, steganography is not the same as cryptography. Cashback will be credited as Amazon Pay balance within 15 days from purchase. Here's how terms and conditions apply Go Cashless: Only on your first 2 cashless orders on Amazon. Offer period 4th Sep to 30th Sep. Cashback within 10 days.
Offer valid only once per customer including mobile recharges and bill payments. Here's how terms and conditions apply. Review From the reviews: To get the free app, enter mobile phone number. See all free Kindle reading apps. Start reading Data Privacy and Security on your Kindle in under a minute. Don't have a Kindle? Springer; Softcover reprint of the original 1st ed. Be the first to review this item Would you like to tell us about a lower price?
Customer reviews There are no customer reviews yet. Share your thoughts with other customers. Write a product review. Your recently viewed items and featured recommendations. View or edit your browsing history. Get to Know Us.