Steganography in Support of the Global Terrorism

Bogdanoski, Mitko and Risteski, Aleksandar and Bogdanoski, Marjan (2015) Steganography in Support of the Global Terrorism. In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. NATO Science for Peace and Security Series - D: Information and Communication Security, 12 . IOS Press, pp. 15-28.

[img] Text
40955 - Published Version

Download (15Kb)

Abstract

The way of conducting terrorism with the time is becoming more sophisticated. Namely, there are eight different ways in which contemporary terrorists use the Internet, ranging from psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions. Coordination of the terrorist activity is key for their success. However coordination of their global activity is going through global network controlled and often monitored by ISPs (Internet Service Providers), LEAs (Law Enforcement Agencies), and different security and intelligence agencies. The terrorists are aware that the messages sent to their perpetrators through the Internet can be intercepted very easily and thus their intentions can be detected. Therefore, they are using different methods to protect their information. The two most used techniques of information protection are cryptography and information hiding. This chapter will cover only one of the mentioned techniques which deals with information hiding, or more specific it will cover different steganography techniques and tools. It will give short review of several different steganographic tools. Furthermore, it will explain specific usage of some of these tools. The chapter also tends to explain the different steganalysis techniques that are striking a significant blow not only to the terrorist organizations, but also on any other individual or group that use steganographic techniques as a way for covert transmission of their malicious intents. The chapter will show not only practical usage of some specific steganalysis tools but also usage of some tools whose basic function are not connected with this technique but can give significant contribution in steganalysis process and determining the existence of hidden objects. $35.00 / €27.50 / £22.00 Add PDF to cart

Item Type: Book Section
Subjects: Natural sciences > Computer and information sciences
Engineering and Technology > Electrical engineering, electronic engineering, information engineering
Engineering and Technology > Other engineering and technologies
Divisions: Faculty of Computer Science
Faculty of Electrical Engineering
Faculty of Natural and Technical Sciences
Faculty of Technology
Military Academy
Depositing User: Mitko Bogdanoski
Date Deposited: 29 Sep 2015 11:49
Last Modified: 29 Sep 2015 11:49
URI: http://eprints.ugd.edu.mk/id/eprint/13873

Actions (login required)

View Item View Item