2017
DOI: 10.3139/124.110651
|View full text |Cite
|
Sign up to set email alerts
|

Font Attributes based Text Steganographic algorithm (FATS) for communicating images: A nuclear power plant perspective

Abstract: Today even sensitive organizations like nuclear power plants are connected to the internet. As information security is of utmost priority to such organizations, achieving the same is a challenging task while using the public network like the internet. Though cryptography could be used to enhance the information security, it cannot hide its own presence from the attackers. This drawback lead security professionals to look for an alternate technique like steganography. Steganography hides the secret information,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Thus, IS governance is present in the corporate environment of large and medium companies, and this theme is becoming consolidated in the market, but information security focused on operational availability of an electricity generation plant is something really difficult to see nowadays (Krishnan et al, 2017).…”
Section: Information Security Governance In the Electricity Industrymentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, IS governance is present in the corporate environment of large and medium companies, and this theme is becoming consolidated in the market, but information security focused on operational availability of an electricity generation plant is something really difficult to see nowadays (Krishnan et al, 2017).…”
Section: Information Security Governance In the Electricity Industrymentioning
confidence: 99%
“…Only 17.3% of respondents answered that the level of utilization was low or very low, leaving a good percent of organizations with high technological resources. Since technology influences performance and particularly information security, in this question, its importance in the literature was identified based on Machado et al (2016), Krishnan et al (2017).…”
Section: Information Security Governance: Utilization X Importancementioning
confidence: 99%