Skip to main content

Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans

  • Chapter
  • First Online:
Book cover Practical Information Security

Abstract

Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible. As users in the Internet communicate without seeing each other, mechanisms should exist to validate the identity of each party of the communication activity to the second party. Their communication and all information exchanged between them should be also protected so that no third party can possible see or expose such data or information.

In this chapter, we will focus on three important activities related to information processing: Information hiding or protection through encryption and information integrity verification through hashing and information concealment through steganography and watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I., Burdwell, R., Aleroud, A., Wahbeh, A., Al-Qudah, M., Al-Omari, A. (2018). Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans. In: Practical Information Security. Springer, Cham. https://doi.org/10.1007/978-3-319-72119-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72119-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72118-7

  • Online ISBN: 978-3-319-72119-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics