{"title":"动态隐写增加了额外的数据安全性","authors":"R. Zavaleta, S. Wunnava","doi":"10.1109/SECON.2004.1287948","DOIUrl":null,"url":null,"abstract":"Today's data security consists of many layers. Data activity may be hidden, in addition to encryption, to make it more secure. Steganography provides a possible solution, to further enhance the data security. This paper presents the concept of basic steganography and further improvements as well as the attacks on steganography. In this article, the authors will present the investigations carried out using the stegano principles, to enhance the data security and data integrity.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Dynamic Steganography Adds Additional Data Security\",\"authors\":\"R. Zavaleta, S. Wunnava\",\"doi\":\"10.1109/SECON.2004.1287948\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today's data security consists of many layers. Data activity may be hidden, in addition to encryption, to make it more secure. Steganography provides a possible solution, to further enhance the data security. This paper presents the concept of basic steganography and further improvements as well as the attacks on steganography. In this article, the authors will present the investigations carried out using the stegano principles, to enhance the data security and data integrity.\",\"PeriodicalId\":324953,\"journal\":{\"name\":\"IEEE SoutheastCon, 2004. Proceedings.\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE SoutheastCon, 2004. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2004.1287948\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE SoutheastCon, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2004.1287948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Steganography Adds Additional Data Security
Today's data security consists of many layers. Data activity may be hidden, in addition to encryption, to make it more secure. Steganography provides a possible solution, to further enhance the data security. This paper presents the concept of basic steganography and further improvements as well as the attacks on steganography. In this article, the authors will present the investigations carried out using the stegano principles, to enhance the data security and data integrity.