Adrian IVAN


Abstract: Intelligence plays a very important role in supporting decision-making. Once intelligence has been collected, it must be sent as quickly as possible to the decision-maker, but prior to transmission, the intelligence product must be encrypted, hidden from view. Well-known and widespread techniques by which intelligence is manipulated for the purpose of encoding/encryption and hiding its existence are cryptography and steganography.
Keywords: intelligence; cryptography; steganography; key; code; encrypted message.

Full Text:



*** AJP 2.0, „Allied Joint doctrine for Intelligence, Counterintelligence and Security”, 2003.

Berg, George; Davidson, Ian; Duan, Ming-Yuan and Goutam, Paul, „Searching ForHidden Messages: Automatic Detection of Steganography”, Computer Science Department University at Albany, Washington, USA.

FM 2-0, „Intelligence”, Department of the Army, Washington, May 2004, USA.

Groza, Bogdan, „Introduction to Cryptography, Cryptographic Functions, Mathematical and Computational Foundations”, Politehnica Publishing House, 2012.

Hellman, Martin Edward;Whitfield, Diffie and Merkle, Ralph, „New Directions in Cryptography”, Transactions on Information Theory, Vol. IT-22, No. 6, November 1976.

Konheim, A., „Computer Security and Cryptography”, Wiley Interscience, 2007.

Joseph, Raphael; Sundaram, V.,„Cryptography and Steganography – A

Survey”, Int. J. Comp. Tech. Appl., Vol 2 (3), USA.

Rausch, Peter; Sheta, Alaa; Ayesh ,Aladdin, “Business Intelligence and

Performance Management” Theory, Systems, and Industrial Applications,

Springer Verlag U.K., 2013.

Raţiu, Crina Anina, “Optimization and Security of E-Business Systems”, PhD thesis, Cluj-Napoca, 2016.

Zielińska, Elżbieta; Mazurczyk, Wojciech; Szczypiorski; Krzysztof, „Development Trends in Steganography”, WarsawUniversity of Technology, Warsaw 2012, Poland.

Simion, Emil; Naccache, 11. David; Mihaiţă, Adela; Olimid, Ruxandra Florentina; Oprina Andrei George, „Criptography and Information Security”, Matrixrom Publishing House, Bucharest, 2012.

Wayner, P., „Disapearing Cryptography - Information Hiding: Steganography & Watermarking (Second Edition)”, Morgan

Kaufmann Publishers, 2002, USA.


  • There are currently no refbacks.