Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography

The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...

Full description

Saved in:
Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman
Format: Article
Language:English
Published: IJCSNS 2009
Subjects:
Online Access:http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf
http://irep.iium.edu.my/420/
http://paper.ijcsns.org/07_book/html/200905/200905039.html
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items