Bogdanoski, Mitko and Risteski, Aleksandar and Bogdanoski, Marjan (2015) Steganography in Support of the Global Terrorism. In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. NATO Science for Peace and Security Series - D: Information and Communication Security, 12 . IOS Press, pp. 15-28.
Text
40955 - Published Version Download (15kB) |
Abstract
The way of conducting terrorism with the time is becoming more sophisticated. Namely, there are eight different ways in which contemporary terrorists use the Internet, ranging from psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions. Coordination of the terrorist activity is key for their success. However coordination of their global activity is going through global network controlled and often monitored by ISPs (Internet Service Providers), LEAs (Law Enforcement Agencies), and different security and intelligence agencies. The terrorists are aware that the messages sent to their perpetrators through the Internet can be intercepted very easily and thus their intentions can be detected. Therefore, they are using different methods to protect their information. The two most used techniques of information protection are cryptography and information hiding. This chapter will cover only one of the mentioned techniques which deals with information hiding, or more specific it will cover different steganography techniques and tools. It will give short review of several different steganographic tools. Furthermore, it will explain specific usage of some of these tools. The chapter also tends to explain the different steganalysis techniques that are striking a significant blow not only to the terrorist organizations, but also on any other individual or group that use steganographic techniques as a way for covert transmission of their malicious intents. The chapter will show not only practical usage of some specific steganalysis tools but also usage of some tools whose basic function are not connected with this technique but can give significant contribution in steganalysis process and determining the existence of hidden objects.
$35.00 / €27.50 / £22.00
Add PDF to cart
Item Type: | Book Section |
---|---|
Subjects: | Natural sciences > Computer and information sciences Engineering and Technology > Electrical engineering, electronic engineering, information engineering Engineering and Technology > Other engineering and technologies |
Divisions: | Faculty of Computer Science Faculty of Electrical Engineering Faculty of Natural and Technical Sciences Faculty of Technology Military Academy |
Depositing User: | Mitko Bogdanoski |
Date Deposited: | 29 Sep 2015 11:49 |
Last Modified: | 29 Sep 2015 11:49 |
URI: | https://eprints.ugd.edu.mk/id/eprint/13873 |
Actions (login required)
View Item |