Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography

The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...

Full description

Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman
Format: Article
Language:English
Published: IJCSNS 2009
Subjects:
Online Access:http://irep.iium.edu.my/420/
http://irep.iium.edu.my/420/
http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf