Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
Main Authors: | Zaidan , A. A., Othman, Fazidah, Zaidan , B. B., Raji, R. Z., Hasan, Ahmed K., Naji, Ahmed Wathik |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/10842/ http://irep.iium.edu.my/10842/ http://irep.iium.edu.my/10842/4/securing_cover-file.pdf |
Similar Items
-
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)