ISSN 2224-087X (Print)
ISSN 2224-0888 (Online)

Collected scientific papers
"Electronics and information technologies"

(In 1966-2010 published under the title "Electrical engineering")

(Certificate of State Registration 17618-6468 from February 11, 2011)

Main page Search Editorial Policies Rules for Authors

Issue 8

Issue 8, Pages: 3-17
DOI: https://doi.org/
Modern methods and means of information protection
Yu. Korchak, Yu. Furgala, L. Korchak
The paper gives an overview of steganographic and biometric methods and means of information protection, as well as passwords, their current state and perspectives. Particular attention is devoted to methods of creating passwords, requirements to their length and quality. Using the GRC password crack checker service, the analysis of the dependence of the password break time on its quality (length, type of characters used) is analyzed. It has been shown that for safe protection against unauthorized interference, the length of the password must be at least 12 characters, using upper and lower case letters, numbers and special characters. Several approaches to creating passwords are considered, including replacement codes, mnemonic method, Blum’s method. An analysis of trends in the development of computer steganography shows that in the near future interest in the development of its methods will only increase. One of the reasons for increasing interest in steganography is that a few of countries have adopted restrictions on the use of strong cryptography and the use of steganography solves this problem.The stages of use of steganography for information security are considered and a series of applied software tools for creating a steganographic message (S-Tools, Steganos, JSteg, Hide-in-Picture), and conducting steganalization (StegDetect, FTK Imager, Stegosuite, File Signature Header, Maresware Forensic Suite) are described. Today, the biometric methods of protecting information that are most likely to identify a person are rapidly developing. These information security methods are among the most promising and are already widely used today by such famous manufacturers of electronic and computer equipment as Sharp, CardMedia, Fujitsu, Apple, Biolink Technologies. The article describes modern technologies and devices that are already used to identify fingerprints of a person, which ensures reliable protection against unauthorized interference.
PDF Version

Main page Search Editorial Policies Rules for Authors

© Ivan Franko National University of Lviv, 2011

Developed and supported - Laboratory of high performance computing systems