Uses and applications of steganography in the digital age
DOI:
https://doi.org/10.62465/rri.v2n1.2023.21Keywords:
Esteganografía, esteganografía digital, ocultamiento de información, seguridad de la información, privacidad y criptografíaAbstract
Steganography is a computer security technique that allows information to be hidden in digital objects without being detected by other users. In today's digital age, this technique is highly valuable in ensuring data security and privacy in digital communication. This paper explores the uses and applications of steganography in the digital age, making an analysis of the existing literature and the results worldwide. The literature review demonstrates the importance of steganography in data protection and computer security, and various applications have been identified, such as information security in banking, sending emails and the protection of medical images. The research methodology used a systematic review of the scientific literature for the collection of information. The worldwide results show that steganography is a widely used technique in different fields and that its application allows maintaining the privacy and security of information. Disadvantages include the possible malicious use of the technique to commit crimes. In the discussion, the results obtained were evaluated, comparisons were established and the challenges that arise when using steganography in the digital age were identified. In the conclusions, the most relevant information was summarized, the most important findings were highlighted, and recommendations for future research were presented. In conclusion, steganography is a useful technique to protect and guarantee the security of information in the digital age, with some disadvantages, but its application can be a great advantage to guarantee data privacy and prevent possible computer attacks.
Downloads
References
Aguirreburualde de Dios, A. (2022). Internet Oscura e Internet Profunda.
Barajas, K. B., & Carreño, N. P. (2019). Desafíos de la etnografía digital en el trabajo de campo onlife. Virtualis, 10(18), 134-151.
Benavides, E., Fuertes, W., Sanchez, S., & Nuñez-Agurto, D. (2020). Caracterización de los ataques de phishing y técnicas para mitigarlos. Ataques: una revisión sistemática de la literatura. Ciencia y Tecnología, 13(1), 97-104. DOI: https://doi.org/10.18779/cyt.v13i1.357
Briceño, E. V. (2020). Planificación y ejecución de evaluaciones de seguridad informática desde un enfoque de ethical hacking. 3Ciencias. DOI: https://doi.org/10.17993/tics.2020.3
Chala, Y. F. (2019). Importancia de la aplicación del mecanismo de cifrado de información en las empresas para la prevención de riesgos como ataques, plagio y pérdida de la confidencialidad.
Gallardo Urbini, I. M. (2022). Estrategia de Ciberseguridad distribuida, aplicando el concepto de Operación de Inteligencia (Doctoral dissertation, Universidad Nacional de La Plata).
Grisales-Aguirre, A. M. (2018). Uso de recursos TIC en la enseñanza de las matemáticas: retos y perspectivas. Entramado, 14(2), 198-214. DOI: https://doi.org/10.18041/1900-3803/entramado.2.4751
Guaña-Moya, J., Chiluisa-Chiluisa, M. A., del Carmen Jaramillo-Flores, P., Naranjo-Villota, D., Mora-Zambrano, E. R., & Larrea-Torres, L. G. (2022, June). Ataques de phishing y cómo prevenirlos Phishing attacks and how to prevent them. In 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-6). IEEE. DOI: https://doi.org/10.23919/CISTI54924.2022.9820161
Jaimes Iguavita, N., & López Suárez, F. A. (2018). Implementación de un sistema de logueo con la técnica de esteganografía digital en la plataforma Moodle.
Moreno Jaraba, J. A. (2023). Estudio de la detección de ciberataques de estenografía para evitar ingreso de Software malicioso y evitar pérdidas de información en la Cámara de Comercio de Barrancabermeja.
Muñoz Ardila, R. D. (2020). Aplicación móvil para la protección de la privacidad de la información digital utilizando técnicas esteganográficas y de encriptación.
Muñoz, A. M. (2016). Privacidad y Ocultación de Información Digital Esteganografía: Protegiendo y Atacando Redes Informáticas. Ra-Ma Editorial.
Navas, G. S., & Rodríguez Medina, G. (2019). Esteganografía por sustitución múltiple, implementación en Matlab. In XXI Workshop de Investigadores en Ciencias de la Computación (WICC 2019, Universidad Nacional de San Juan).
Quintana, Y. (2023). Ciberguerra. Los libros de la Catarata.
Sanchís Francés, C. (2022). Esteganografía y ocultación de información aplicadas a bibliotecas (Master's thesis).
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Javier Guaña Moya
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License 4.0 that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.