Challenges of hidden data in the unused area two within executable files
Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or m...
| Main Authors: | Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1253/ http://irep.iium.edu.my/1253/1/Challenges_of_Hidden_Data_in_the_Unused_Area_Two_within_Executable_Files.pdf |
Similar Items
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
The Hidden Costs of Trade Execution
by: Rath, Subhrendu
Published: (2004)
by: Rath, Subhrendu
Published: (2004)
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Execution time prediction of imperative paradigm tasks for grid scheduling optimization
by: Kiran, Maleeha, et al.
Published: (2009)
by: Kiran, Maleeha, et al.
Published: (2009)
A computer based simulator for Erbium-Doped Fiber Amplifier
by: Naji, Ahmed Wathik, et al.
Published: (2010)
by: Naji, Ahmed Wathik, et al.
Published: (2010)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
Novel MEMS fully differential capacitive transducer design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
An accurate method to obtain bio-metric measurements for three dimensional skull
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
The Utilization of Unused Paddy Lands in Negeri Sembilan
by: Thiran, Nyanen
Published: (1981)
by: Thiran, Nyanen
Published: (1981)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
A low-cost first-order sigma-delta converter design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
QoS challenges in mobile environment
by: Mudathir, Muhammad Alfateh, et al.
Published: (2014)
by: Mudathir, Muhammad Alfateh, et al.
Published: (2014)
Measuring the Unused Capacity for Mature and Immature Area in Palm Oil Nursery Using Time Driven Activity-Based Costing
by: S. N. A. M., Zaini, et al.
Published: (2021)
by: S. N. A. M., Zaini, et al.
Published: (2021)
A qualitative overview of capacitive sensing techniques for two phase flow measurement
by: Tasnim, R., et al.
Published: (2012)
by: Tasnim, R., et al.
Published: (2012)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
An overview: laser applications in dentistry
by: M. Jawad, Mohammed, et al.
Published: (2011)
by: M. Jawad, Mohammed, et al.
Published: (2011)
Bandwith conservation framework for mobile cloud computing: challenges and solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Analysis of two adjacent articulation Quranic letters based on MFCC and DTW
by: Altalmas, Tareq, M., et al.
Published: (2018)
by: Altalmas, Tareq, M., et al.
Published: (2018)
CDR analysis using big data technology
by: Elagib, Sara B., et al.
Published: (2016)
by: Elagib, Sara B., et al.
Published: (2016)
On the multi-agent learning neural and Bayesian methods in skin detector and pornography classifier: an automated anti-pornography system
by: Zaidan , A. A., et al.
Published: (2014)
by: Zaidan , A. A., et al.
Published: (2014)
Design and fabricate two shelves file cart
by: Muhammad Suhail, Md Ibrahim
Published: (2009)
by: Muhammad Suhail, Md Ibrahim
Published: (2009)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
Dust-storm induced cross-polarization at MMW dands in Northern Nigeria
by: Musa, A.A, et al.
Published: (2012)
by: Musa, A.A, et al.
Published: (2012)
Measurement of photoplethysmography signal for heart rate variability and comparison of two different age groups
by: Shah, Mansoor Hussain, et al.
Published: (2015)
by: Shah, Mansoor Hussain, et al.
Published: (2015)
Unused medication waste: respondent’s opinion from current study in Malaysia
by: Islam, Mohd Aminul, et al.
Published: (2018)
by: Islam, Mohd Aminul, et al.
Published: (2018)
Unused medication waste: respondent’s opinion from current study in Malaysia.
by: Abdul Kalam, Azad, et al.
Published: (2018)
by: Abdul Kalam, Azad, et al.
Published: (2018)
Disposal practices of unused and expired pharmaceuticals among general public in Kabul
by: Bashaar, Mohammad, et al.
Published: (2017)
by: Bashaar, Mohammad, et al.
Published: (2017)
Similar Items
-
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009) -
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)