expand for answer

Concealment systems

A method of keeping sensitive information confidential by embedding it in irrelevant data.


Similar items:
To cause to be an integral part of a surrounding whole. In steganography and watermarking, embedding refers to the process of inserting the hidden message into the cover medium.
[view]
Microsoft’s Object Linking and Embedding technology designed to let applications share functionality through live data exchange and embedded data. Embedded objects are packaged statically within the source application, called the “client;” linked objects launch the “server” applications when instructed by the client application. Linking is the capability to call a program; embedding places data in a foreign program.
[view]
A government/military classification used for data of a confidential nature. Unauthorized disclosure of confidential data will have noticeable effects and cause damage to national security. This classification is used for all data between secret and unclassified classifications.
[view]
An assigned classification or sensitivity level used in security models to determine the level of security required to protect an object and prevent unauthorized access. Information representing the sensitivity of a subject or object, such as UNCLASSIFIED or its hierarchical classification (CONFIDENTIAL, SECRET, TOP SECRET) together with any applicable nonhierarchical security categories (e. g. , sensitive compartmented information, critical nuclear weapon design information). Piece of information that represents the sensitivity of a subject or object, such as its hierarchical classification (CONFIDENTIAL,
[view]
(1) The method of concealing the existence of a message or data within seemingly innocent covers. (2) A technology used to embed information in audio and graphical material. The audio and graphical materials appear unaltered until a steganography tool is used to reveal the hidden message. The act of embedding messages within another message, commonly used within an image or a WAV file.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in