{"title":"隐写术用于攻击信息和通信系统","authors":"A. Romanova, S. Toliupa","doi":"10.5604/01.3001.0012.8021","DOIUrl":null,"url":null,"abstract":"An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS\",\"authors\":\"A. Romanova, S. Toliupa\",\"doi\":\"10.5604/01.3001.0012.8021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.\",\"PeriodicalId\":53131,\"journal\":{\"name\":\"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0012.8021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0012.8021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.