CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS
Abstract: Intelligence plays a very important role in supporting decision-making. Once intelligence has been collected, it must be sent as quickly as possible to the decision-maker, but prior to transmission, the intelligence product must be encrypted, hidden from view. Well-known and widespread techniques by which intelligence is manipulated for the purpose of encoding/encryption and hiding its existence are cryptography and steganography.
Keywords: intelligence; cryptography; steganography; key; code; encrypted message.
*** AJP 2.0, „Allied Joint doctrine for Intelligence, Counterintelligence and Security”, 2003.
Berg, George; Davidson, Ian; Duan, Ming-Yuan and Goutam, Paul, „Searching ForHidden Messages: Automatic Detection of Steganography”, Computer Science Department University at Albany, Washington, USA.
FM 2-0, „Intelligence”, Department of the Army, Washington, May 2004, USA.
Groza, Bogdan, „Introduction to Cryptography, Cryptographic Functions, Mathematical and Computational Foundations”, Politehnica Publishing House, 2012.
Hellman, Martin Edward;Whitfield, Diffie and Merkle, Ralph, „New Directions in Cryptography”, Transactions on Information Theory, Vol. IT-22, No. 6, November 1976.
Konheim, A., „Computer Security and Cryptography”, Wiley Interscience, 2007.
Joseph, Raphael; Sundaram, V.,„Cryptography and Steganography – A
Survey”, Int. J. Comp. Tech. Appl., Vol 2 (3), USA.
Rausch, Peter; Sheta, Alaa; Ayesh ,Aladdin, “Business Intelligence and
Performance Management” Theory, Systems, and Industrial Applications,
Springer Verlag U.K., 2013.
Raţiu, Crina Anina, “Optimization and Security of E-Business Systems”, PhD thesis, Cluj-Napoca, 2016.
Zielińska, Elżbieta; Mazurczyk, Wojciech; Szczypiorski; Krzysztof, „Development Trends in Steganography”, WarsawUniversity of Technology, Warsaw 2012, Poland.
Simion, Emil; Naccache, 11. David; Mihaiţă, Adela; Olimid, Ruxandra Florentina; Oprina Andrei George, „Criptography and Information Security”, Matrixrom Publishing House, Bucharest, 2012.
Wayner, P., „Disapearing Cryptography - Information Hiding: Steganography & Watermarking (Second Edition)”, Morgan
Kaufmann Publishers, 2002, USA.
How to Cite
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.