New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology,it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel...
| Main Authors: | Islam, Md. Rafiqul, Naji, Ahmed Wathik, Zaidan , A. A., Zaidan , B. B. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LJS Publisher and IJCSIS Press
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/3440/ http://irep.iium.edu.my/3440/1/1002.2416.pdf |
Similar Items
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Android-based P2P file sharing over zigBee radios
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
P2P file sharing app for android devices sporting IEEE802.15.4 zigbee radios
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Analysis of the Rain Effects on Terrestrial Free Space Optics Based on Data Measured in Tropical Climate.
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
Exploring the challenges of MP3 audio steganography
by: Atoum, Mohammed Salem, et al.
Published: (2014)
by: Atoum, Mohammed Salem, et al.
Published: (2014)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
The effect of weather on free space optics communication (FSO) under tropical weather conditions and a proposed setup for measurement
by: Zabidi, Suriza Ahmad, et al.
Published: (2010)
by: Zabidi, Suriza Ahmad, et al.
Published: (2010)
Effects of rain intensity variation on rain attenuation prediction for Free Space Optics (FSO) links
by: Ahmad Zabidi, Suriza, et al.
Published: (2012)
by: Ahmad Zabidi, Suriza, et al.
Published: (2012)
Availability modeling of terrestrial hybrid FSO/RF based on weather statistics from tropical region
by: Basahel, Ahmed A, et al.
Published: (2020)
by: Basahel, Ahmed A, et al.
Published: (2020)
A proposed rain attenuation prediction method for free space optical link based on rain rate statistics
by: Basahel, Ahmed, et al.
Published: (2015)
by: Basahel, Ahmed, et al.
Published: (2015)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
A proposed rain attenuation prediction method for free space optical link based on rain rate statistics
by: Basahel, Ahmed, et al.
Published: (2015)
by: Basahel, Ahmed, et al.
Published: (2015)
Availability analysis of free-space-optical links based on rain rate and visibility statistics from tropical a climate
by: Basahel, Ahmed, et al.
Published: (2016)
by: Basahel, Ahmed, et al.
Published: (2016)
Gateway placement optimisation problem for mobile multicast
design in wireless mesh networks
by: Sanni, Mistura L., et al.
Published: (2012)
by: Sanni, Mistura L., et al.
Published: (2012)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Statistics of rainfall rate at 60 minutes integration time in Malaysia
by: Sobli, Nuurul Hudaa, et al.
Published: (2014)
by: Sobli, Nuurul Hudaa, et al.
Published: (2014)
RSSI measurements of a GSM signal within an indoor environment
by: Ismail, Ahmad Fadzil, et al.
Published: (2017)
by: Ismail, Ahmad Fadzil, et al.
Published: (2017)
Architectural framework for mobile multicast support in wireless mesh networks
by: Sanni, Mistura L., et al.
Published: (2013)
by: Sanni, Mistura L., et al.
Published: (2013)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Search engine optimization algorithms for page ranking: comparative study
by: Ullah, Arif, et al.
Published: (2018)
by: Ullah, Arif, et al.
Published: (2018)
Using full rainfall rate distribution for rain attenuation predictions over terrestrial microwave links in Malaysia
by: Abdulrahman, A Y, et al.
Published: (2013)
by: Abdulrahman, A Y, et al.
Published: (2013)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Two-year rain fade empirical measurement and statistics of earth-space link at ka-band in Malaysia
by: Ahmad, Yasser Asrul, et al.
Published: (2019)
by: Ahmad, Yasser Asrul, et al.
Published: (2019)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Investigation of the unified rain attenuation prediction method with data from tropical climates
by: Abdulrahman, A Y, et al.
Published: (2014)
by: Abdulrahman, A Y, et al.
Published: (2014)
An improved slant path attenuation prediction method in tropical climates
by: Abdulrahman, A Y, et al.
Published: (2013)
by: Abdulrahman, A Y, et al.
Published: (2013)
Comparison of file sanitization techniques in usb based on average file entropy valves
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Comparison of file sanitization techniques in USB based on average file entropy values
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
An improved ITU-R rain attenuation prediction model over terrestrial microwave links in tropical region
by: Islam, Md Rafiqul, et al.
Published: (2012)
by: Islam, Md Rafiqul, et al.
Published: (2012)
Ultra wideband antenna with band notch using asymmetrical feedline
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
Multi-band reconfigurable antenna using RF MEMS switch
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
Similar Items
-
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)