Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSNS
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf |
id |
iium-420 |
---|---|
recordtype |
eprints |
spelling |
iium-4202011-06-16T08:03:16Z http://irep.iium.edu.my/420/ Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography Naji, Ahmed Wathik Zaidan, B.B. Hameed, Shihab A. O-Khalifa, Othman QA76 Computer software The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java. IJCSNS 2009-05 Article PeerReviewed application/pdf en http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf Naji, Ahmed Wathik and Zaidan, B.B. and Hameed, Shihab A. and O-Khalifa, Othman (2009) Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography. International Journal of Computer Science and Network Security (IJCSNS), 9 (5). pp. 294-300. ISSN 1738-7906 http://paper.ijcsns.org/07_book/html/200905/200905039.html |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Naji, Ahmed Wathik Zaidan, B.B. Hameed, Shihab A. O-Khalifa, Othman Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography |
description |
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java. |
format |
Article |
author |
Naji, Ahmed Wathik Zaidan, B.B. Hameed, Shihab A. O-Khalifa, Othman |
author_facet |
Naji, Ahmed Wathik Zaidan, B.B. Hameed, Shihab A. O-Khalifa, Othman |
author_sort |
Naji, Ahmed Wathik |
title |
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography |
title_short |
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography |
title_full |
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography |
title_fullStr |
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography |
title_full_unstemmed |
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography |
title_sort |
novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography |
publisher |
IJCSNS |
publishDate |
2009 |
url |
http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf |
first_indexed |
2023-09-18T20:07:33Z |
last_indexed |
2023-09-18T20:07:33Z |
_version_ |
1777407259364556800 |