{"id":2014,"date":"2021-12-17T08:55:46","date_gmt":"2021-12-17T08:55:46","guid":{"rendered":"https:\/\/csit.uokerbala.edu.iq\/en\/?p=2014"},"modified":"2021-12-17T08:55:49","modified_gmt":"2021-12-17T08:55:49","slug":"a-webinar-entitled-data-security-using-cryptography-and-steganography-techniques","status":"publish","type":"post","link":"https:\/\/csit.uokerbala.edu.iq\/en\/a-webinar-entitled-data-security-using-cryptography-and-steganography-techniques\/","title":{"rendered":"A webinar entitled Data security using cryptography and steganography techniques"},"content":{"rendered":"\n<p>The Department of information technology in the faculty of Computer Science and Information Technology \u2013University of Karbala held a webinar entitled (Data security using cryptography and steganography techniques ) presented by Manar Hamza a lecturer in the department of computer science. The webinar discussed the topic of coding and decoding the data in order to provide protection to data. Cryptography and steganography are the two popular methods available to provide data security. The objective of cryptography is data protection and the objective of steganography is secret communication. Cryptography converts the data into ciphertext that can be in unreadable format to normal user where steganography hides the existence of message by embedding data into some other digital media. Both of them have their own vulnerabilities. The combination between cryptography and steganography overcomes each other\u2019s weakness and make it difficult for intruders to attack or steal sensitive information. At the end of the discussion, the most important research and sources that related to this topic were presented.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"458\" src=\"https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1-1024x458.png\" alt=\"\" class=\"wp-image-2016\" srcset=\"https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1-1024x458.png 1024w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1-300x134.png 300w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1-768x344.png 768w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1-1536x688.png 1536w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/2-1.png 1769w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1.png\"><img decoding=\"async\" width=\"1024\" height=\"460\" src=\"https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1-1024x460.png\" alt=\"\" class=\"wp-image-2017\" srcset=\"https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1-1024x460.png 1024w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1-300x135.png 300w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1-768x345.png 768w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1-1536x690.png 1536w, https:\/\/csit.uokerbala.edu.iq\/en\/wp-content\/uploads\/sites\/2\/2021\/12\/3-1.png 1911w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Department of information technology in the faculty of Computer Science and Information Technology \u2013University of Karbala held a webinar entitled (Data security using cryptography and steganography techniques ) presented by Manar Hamza a lecturer in the department of computer science. The webinar discussed the topic of coding and decoding the data in order to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2015,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[5,3,4],"tags":[],"class_list":["post-2014","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-department-it","category-news","category-seminar","entry","has-media"],"_links":{"self":[{"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/posts\/2014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/comments?post=2014"}],"version-history":[{"count":1,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/posts\/2014\/revisions"}],"predecessor-version":[{"id":2018,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/posts\/2014\/revisions\/2018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/media\/2015"}],"wp:attachment":[{"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/media?parent=2014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/categories?post=2014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csit.uokerbala.edu.iq\/en\/wp-json\/wp\/v2\/tags?post=2014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}