Advertisement

Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans

  • Izzat Alsmadi
  • Robert Burdwell
  • Ahmed Aleroud
  • Abdallah Wahbeh
  • Mahmood Al-Qudah
  • Ahmad Al-Omari
Chapter

Abstract

Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible. As users in the Internet communicate without seeing each other, mechanisms should exist to validate the identity of each party of the communication activity to the second party. Their communication and all information exchanged between them should be also protected so that no third party can possible see or expose such data or information.

In this chapter, we will focus on three important activities related to information processing: Information hiding or protection through encryption and information integrity verification through hashing and information concealment through steganography and watermarking.

References

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  • Robert Burdwell
    • 1
  • Ahmed Aleroud
    • 2
  • Abdallah Wahbeh
    • 3
  • Mahmood Al-Qudah
    • 4
  • Ahmad Al-Omari
    • 5
  1. 1.Texas A&M University San AntonioSan AntonioUSA
  2. 2.Department of Computer Information SystemsYarmouk UniversityIrbidJordan
  3. 3.Slippery Rock University of PennsylvaniaSlippery RockUSA
  4. 4.Yarmouk UniversityIrbidJordan
  5. 5.Schreiner UniversityKerrvilleUSA

Personalised recommendations