Document Type
Article
Rights
Available under a Creative Commons Attribution Non-Commercial Share Alike 4.0 International Licence
Disciplines
Applied mathematics
Abstract
Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together with the protocols and procedures that are adopted in order to implement them. These standards are of course continually scrutinized for their effectiveness and undergo improvements and/or changes as required.
DOI
10.21427/D7ZS63
Recommended Citation
Blackledge, J. (2011) Cryptography and Steganography: New Algorithms and Applications. Lecture Notes, Centre for Advanced Studies, Warsaw University of Technology, Warsaw, 2011. doi:10.21427/D7ZS63
Publication Details
Lecture Notes, Centre for Advanced Studies, Warsaw University of Technology, Warsaw 2011
For additional information on this series, visit the CAS Publications Website at
http://www.csz.pw.edu.pl/index.php/en/publications