scispace - formally typeset
Journal ArticleDOI

New Design for Information Hiding with in Steganography Using Distortion Techniques

A. Jalab, +2 more
- 01 Jan 2010 - 
- Vol. 2, Iss: 1, pp 72-77
Reads0
Chats0
TLDR
The aim of the proposed system is to hide information ( data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process.
Abstract
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses , secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review

TL;DR: A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
Journal ArticleDOI

Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis

TL;DR: A decision support examination framework on how individual, security and privacy determinants influence the acceptance and use of EMR is proposed, based on a multi-criteria perspective derived from healthcare professionals in Malaysia as frame of reference.
Posted Content

Overview: Main Fundamentals for Steganography

TL;DR: The main goals for this paper are to recognize the researchers for the main fundamentals of steganography and to provide a general overview of the following subject areas: Steganography types, General Steganographers system, Characterization of Steganographic Systems and Classification of SteGANography Techniques.
Journal ArticleDOI

Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques

TL;DR: This study aims toward a new methodology for evaluation and benchmarking using multi-criteria analysis for software and hardware “FPGA”-based digital watermarking or steganography.
Journal ArticleDOI

Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques

TL;DR: A comparative study of evaluation and benchmarking information hiding approaches based on multi-measurement analysis using the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method in terms of different parameter settings because several settings of TOPSIS are continually making complex decisions within any study case.
References
More filters
Journal ArticleDOI

New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm

TL;DR: This approach will invent high rate and high secure data hidden using secret key steganography and AES Rijndael method and assign the well-built AES algorithm, during this review the author will answer the question why they used AES algorithm.
Journal ArticleDOI

New Technique of Hidden Data in PE-File with in Unused Area One

TL;DR: A new system of information hiding is presented that aims to hide information ( data file) in unused area 1 of any execution file (exe.file) to make sure changes made to the exe.file will not be detected by anti-virus and the functionality of the ex.file is still functioning.
Proceedings ArticleDOI

"Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File

TL;DR: The weak on the hidden data technique (disadvantage, weak point, type of attacker, stage of attacking the massage, ..etc) is highlighted in order to implements stego-analysis system.
Journal ArticleDOI

A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared

TL;DR: A new system of information hiding using computation between cryptography and steganography is presented and the proposed system includes two main functions; first is the hiding of the information in the with in computation area which is unused area two and image page of PE-file (exe.file), and the extraction of the hiding information through three process.
Related Papers (5)