Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...
Main Authors: | Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSNS
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf |
Similar Items
-
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)