Securing Cover-File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography
نویسندگان
چکیده
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Nowadays, protection system can be classified into more specific as hiding information and encryption information or a combination between them. The strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be used in (hiding and encryption) secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) in an execution file (EXE).The new proposed system is able to embed an information in an execution file and also able to retract the hidden file from the execution file. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file. (keyword): Cryptography, Steganography, Information Hiding, Advance Encryption Standard, Portable Executable File. Aos Alaa Zaidan Masters Student, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, phone: +60172452457, Postcode: 50603 and Email: [email protected]. Mrs. Fazidah Othman Lecturer, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, [email protected]. Bilal Bahaa Zaidan Masters Student, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, [email protected]. Raji Zuhair Raji Masters Student, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, [email protected] Ahmed.K.Hasan Masters Student, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, Email: [email protected]. Dr Ahmed Wathik Lecturer, Department of Electrical & Computer Engineering, International Islamic University Malaya, Kuala Lumpur, Malaysia, [email protected].
منابع مشابه
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
---The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the i...
متن کاملHigh Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm
Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It’s a big security and privacy issue with the large flood of information and the development of ...
متن کاملUal L Ayer D Ata H Iding Using C Ryptography and S Teganography
Digital communication has become an essential part of society. Nowadays, a lot of applications are internet based and it is important that communication be made faithful and secret. Steganography and Cryptography are two popular ways of information exchange in a secret way. Steganography hides the existence of the message and the Cryptography distorts the message itself. Using Cryptography, the...
متن کاملA Survey on Steganography Using Multimedia Files
Steganography is a type of secrete communication that hides the secrete information. It deals with the different ways of hiding/embedding the secrete information such as text, image, audio or video files inside another multimedia files with the help of private key. The hidden information is termed as secrete file and the file in which the secrete file is hidden is termed as cover file. The file...
متن کاملHigh capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009