Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...
محفوظ في:
المؤلفون الرئيسيون: | , , , |
---|---|
التنسيق: | مقال |
اللغة: | English |
منشور في: |
IJCSNS
2009
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf http://irep.iium.edu.my/420/ http://paper.ijcsns.org/07_book/html/200905/200905039.html |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|