Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...
| Main Authors: | Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSNS
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/420/ http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf |
Similar Items
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Comparison of file sanitization techniques in usb based on average file entropy valves
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Comparison of file sanitization techniques in USB based on average file entropy values
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2014)
by: Mohamed, Duryana
Published: (2014)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2015)
by: Mohamed, Duryana
Published: (2015)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Order 63A: Electronic Filing
by: Mohamed, Duryana
Published: (2018)
by: Mohamed, Duryana
Published: (2018)
Read data from a file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
File encryption by iris recognition system
by: Musab A. M. Ali,, et al.
Published: (2024)
by: Musab A. M. Ali,, et al.
Published: (2024)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Production of biocomposites file for packaging application
by: Mat Zain, Norashikin, et al.
Published: (2011)
by: Mat Zain, Norashikin, et al.
Published: (2011)
Audio files comparison with wavelet transform
by: Jiang, Chengjun
Published: (2023)
by: Jiang, Chengjun
Published: (2023)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
The performance of the 3DES and Fernet encryption in securing data files
by: Mohd, Siti Munirah, et al.
Published: (2024)
by: Mohd, Siti Munirah, et al.
Published: (2024)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Efficient text data hiding technique using cryptography and steganography
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2024)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
The Helmet Files: Year 5 Teachers Manual
by: Cross, D., et al.
Published: (2000)
by: Cross, D., et al.
Published: (2000)
Design and fabricate two shelves file cart
by: Muhammad Suhail, Md Ibrahim
Published: (2009)
by: Muhammad Suhail, Md Ibrahim
Published: (2009)
Similar Items
-
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)