Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography

The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...

Full description

Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman
Format: Article
Language:English
Published: IJCSNS 2009
Subjects:
Online Access:http://irep.iium.edu.my/420/
http://irep.iium.edu.my/420/
http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf
id iium-420
recordtype eprints
spelling iium-4202011-06-16T08:03:16Z http://irep.iium.edu.my/420/ Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography Naji, Ahmed Wathik Zaidan, B.B. Hameed, Shihab A. O-Khalifa, Othman QA76 Computer software The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java. IJCSNS 2009-05 Article PeerReviewed application/pdf en http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf Naji, Ahmed Wathik and Zaidan, B.B. and Hameed, Shihab A. and O-Khalifa, Othman (2009) Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography. International Journal of Computer Science and Network Security (IJCSNS), 9 (5). pp. 294-300. ISSN 1738-7906 http://paper.ijcsns.org/07_book/html/200905/200905039.html
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Naji, Ahmed Wathik
Zaidan, B.B.
Hameed, Shihab A.
O-Khalifa, Othman
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
description The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.
format Article
author Naji, Ahmed Wathik
Zaidan, B.B.
Hameed, Shihab A.
O-Khalifa, Othman
author_facet Naji, Ahmed Wathik
Zaidan, B.B.
Hameed, Shihab A.
O-Khalifa, Othman
author_sort Naji, Ahmed Wathik
title Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
title_short Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
title_full Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
title_fullStr Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
title_full_unstemmed Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
title_sort novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography
publisher IJCSNS
publishDate 2009
url http://irep.iium.edu.my/420/
http://irep.iium.edu.my/420/
http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf
first_indexed 2023-09-18T20:07:33Z
last_indexed 2023-09-18T20:07:33Z
_version_ 1777407259364556800