{"title":"Hidden Data Transmission during Organizations Interaction","authors":"A. Nikishova, Umnitsyn M.Yu, T. Omelchenko","doi":"10.1109/FarEastCon.2019.8934218","DOIUrl":null,"url":null,"abstract":"Data is a valuable resource. So it should be protected. The most vulnerable action on the data is its transmission. Common approach to data protection during its transmission is cryptography. But of course it has disadvantages. It is proposed to combine methods of cryptography with methods of steganography. Steganography ensures the secrecy of the transmitted data. And so the following approach is proposed. To ensure data integrity and authenticity the digital signature is calculated. To protect data content encryption is used. And at last to hide the fact of data transmission, the method of steganography is used. As the container for steganography method video conference session is chosen.","PeriodicalId":395247,"journal":{"name":"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FarEastCon.2019.8934218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Data is a valuable resource. So it should be protected. The most vulnerable action on the data is its transmission. Common approach to data protection during its transmission is cryptography. But of course it has disadvantages. It is proposed to combine methods of cryptography with methods of steganography. Steganography ensures the secrecy of the transmitted data. And so the following approach is proposed. To ensure data integrity and authenticity the digital signature is calculated. To protect data content encryption is used. And at last to hide the fact of data transmission, the method of steganography is used. As the container for steganography method video conference session is chosen.