Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no forma...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSNS
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/420/1/novel_approach_for_secure_cover_file_of_hidden_data.pdf http://irep.iium.edu.my/420/ http://paper.ijcsns.org/07_book/html/200905/200905039.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|