Open Access Open Access  Restricted Access Subscription Access

MANAGING INFORMATION SECURITY IN DIGITAL AGE

Avijit Dutta, Vinay Kumar

Abstract


Exchange of information in secret and secured manner has been the focus of all concerned from time immemorial. With ever evolving Information and Communication Technologies (ICT), it has shifting perspectives. In digital age, cryptographic efforts for controlling menace of eavesdroppers are evolving and getting standardized with digital identity creation, verification, validation, encryption etc. Recently digital steganographic concepts and techniques have developed the expertise to hide a digital message in a digital cover to avoid detection of its existence while being exchanged between sender and receiver.

An eavesdropper keeps on analyzing procedures used by fair players for message exchange in secured and secret manner. A successful analyzing attempt may lead to misuse of the intercepted information. The game of securing message at one end and rummaging of involved procedures in form of crypt-analysis or steganalysis on the other side is continuously increasing.. Controlling and managing information security has become more complex, when interceptors happen to be from law enforcement agency. The paper deals with such scenarios of information security management.


Keywords


Cryptography, Crypt-analysis, Encryption, Information security, Management, Steganography, Steganalysis

Full Text:

Untitled

References


Anderson, Ross J., (1996), “Stretching the Limits of Steganography”, In Proceedings of the First International Workshop on Information Hiding, pp.39-48.

Business Software Alliance, (2011), “Vehicles for Theft – The Forms of Internet Software Piracy”, Available at http://www.bsa.org/usa/netpiracy/piracykit/VehiclesforTheft.pdf

Cheddad, A., Condell, J., Curran, K., and McKevitt, P., (2010), “Digital image steganography: Survey and analysis of current methods”, Signal Processing, pp.727-752.

Clair, Bryan, (2001), “How to Send a Secret Message”, STRANGE HORIZONS, October 8.

Cachin, Christian, (2005), “Digital Steganography”, Encyclopaedia of Cryptography and Security.

Fabien, A P Petitcolas, Anderson, Ross J, and Kuhn, Markus G., (1999), “Information Hiding: A Survey” Proceedings of the IEEE, special issue on protection of multimedia content, Vol.87(7), pp.1062-1078.

Johnson, Neil F., Duric, Z., Jajodia, S., and Memon, N., (2001), “Information Hiding: Steganography and Watermarking—Attacks and Countermeasures”, J. Electron. Imaging, Vol.10(3), pp.825-826.

Kessler, Gary C., (2002), “Hiding Data in Data”, Windows & .NET Magazine, April.

Kumar, V., (2010), “Encryption Strength Lies beyond Key Length: A Suggestive Approach”, Proceedings of the Fourth INDIACOM National Conference, February, New Delhi, pp.123-127.

Maney, K., (2001), “Bin Laden’s Messages Could Be Hiding In Plain Sight”, USA Today, December 19.

Motameni, H., Norouzi, M., Jahandar, M. and Hatami, A., (2007), “Labeling Method in Steganography”, World Academy of Science, Engineering and Technology 30, pp.349-354.

Owens, M., (2002), “A Discussion of Covert Channels and Steganography”, SANS Institute.

Rajgure, V. A., and Gaikwad, V. T., (2010), “Steganography and Steganalysis: Different Approaches”, Int. Journal of Electronic Signals and Systems, Vol.2(1), pp.165-170.

Rowland, Craig H., (1997), “Covert Channels In the TCP Protocol Suite”, First Monday 2.5 also available at http://www.firstmonday.dk/issues/issue2_5/rowland/ index.html

Schneier, Bruce, (2000), “Secrets & Lies, Digital Security in Networked World”, NY: Wiley & Sons.

Simmons, G. J., (1984), “The prisoners’ problem and the subliminal channel”, Proceedings of Crypto 83 - Advances in Cryptology, pp.51–67.

Summers, Rita C., (1997), “Secure Computing: Threats and Safeguards”, NY; London: McGraw Hill.

Trivedi, S., and Chandramouli, R., (2003), “Active Steganalysis of Sequential Steganography”, SPIE Conference, Vol.5020(13), pp.123-130.


Refbacks

  • There are currently no refbacks.


Send mail to ijmss@ijmss.com with questions or comments about this web site. 

International Journal of Management and Social Sciences, All rights reserved.