Cryptography and Steganography: New Algorithms and Applications.

Jonathan Blackledge

Research output: Contribution to journalArticlepeer-review

Abstract

Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together with the protocols and procedures that are adopted in order to implement them. These standards are of course continually scrutinized for their effectiveness and undergo improvements and/or changes as required.
Original languageEnglish
JournalLecture Notes, Centre for Advanced Studies, Warsaw University of Technology, Warsaw
DOIs
Publication statusPublished - 1 Jan 2011
Externally publishedYes

Keywords

  • secure exchange of information
  • Information Technology
  • military communications
  • industrial and commercial sectors
  • data processing algorithms
  • protocols and procedures
  • industry standards

Fingerprint

Dive into the research topics of 'Cryptography and Steganography: New Algorithms and Applications.'. Together they form a unique fingerprint.

Cite this