Steganography

Signal Security


  • Communication Security
    1. Steganography (invisible inks, open codes, messages in hollow heels) and Transmission Security (spurt radio and spread spectrum systems)
    2. Cryptography(codes and ciphers
    3. Traffic security(call-sign changes, dummy messages, radio silence)

  • Electronic Security
    1. Emission Security (shifting of radar frequencies, spread spectrum)
    2. Counter-Countermeasures "looking through" (jammed radar)

Table 1: Kahn's Security Table

 


Defined

Signal Intelligence


  • Communication Intelligence
    1. Interception and direction-finding




    2. Cryptanalysis
    3. Traffic analysis (direction-finding, message-flow studies, radio finger printing)
  • Electronic Intelligence
    1. Electronic Reconnaissance (eaves-dropping on radar emissions)
    2. Countermeasures (jamming radar and false radar echoes)

Table 1: Kahn's Security Table

 


Next Section: 2.2 Steganography History


[Neil's Homepage] [Security and Privacy] [Steganography]

Copyright, ©1995-2000 Neil F. Johnson. All Rights Reserved.
Send comments or questions to nfj(at)jjtc(dot)com.

Internet Developers Association
Member
The author is a member of
The HTML Writers Guild

Get Microsoft Internet Explorer

  ActiveX

This document uses tables, cascading style sheets, ActiveX controls and VBScript so it is best experienced with Microsoft Internet Explorer.