{"title":"组织交互过程中的隐藏数据传输","authors":"A. Nikishova, Umnitsyn M.Yu, T. Omelchenko","doi":"10.1109/FarEastCon.2019.8934218","DOIUrl":null,"url":null,"abstract":"Data is a valuable resource. So it should be protected. The most vulnerable action on the data is its transmission. Common approach to data protection during its transmission is cryptography. But of course it has disadvantages. It is proposed to combine methods of cryptography with methods of steganography. Steganography ensures the secrecy of the transmitted data. And so the following approach is proposed. To ensure data integrity and authenticity the digital signature is calculated. To protect data content encryption is used. And at last to hide the fact of data transmission, the method of steganography is used. As the container for steganography method video conference session is chosen.","PeriodicalId":395247,"journal":{"name":"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Hidden Data Transmission during Organizations Interaction\",\"authors\":\"A. Nikishova, Umnitsyn M.Yu, T. Omelchenko\",\"doi\":\"10.1109/FarEastCon.2019.8934218\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data is a valuable resource. So it should be protected. The most vulnerable action on the data is its transmission. Common approach to data protection during its transmission is cryptography. But of course it has disadvantages. It is proposed to combine methods of cryptography with methods of steganography. Steganography ensures the secrecy of the transmitted data. And so the following approach is proposed. To ensure data integrity and authenticity the digital signature is calculated. To protect data content encryption is used. And at last to hide the fact of data transmission, the method of steganography is used. As the container for steganography method video conference session is chosen.\",\"PeriodicalId\":395247,\"journal\":{\"name\":\"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)\",\"volume\":\"393 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FarEastCon.2019.8934218\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FarEastCon.2019.8934218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hidden Data Transmission during Organizations Interaction
Data is a valuable resource. So it should be protected. The most vulnerable action on the data is its transmission. Common approach to data protection during its transmission is cryptography. But of course it has disadvantages. It is proposed to combine methods of cryptography with methods of steganography. Steganography ensures the secrecy of the transmitted data. And so the following approach is proposed. To ensure data integrity and authenticity the digital signature is calculated. To protect data content encryption is used. And at last to hide the fact of data transmission, the method of steganography is used. As the container for steganography method video conference session is chosen.