Challenges of hidden data in the unused area two within executable files

Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or m...

Full description

Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.
Format: Article
Language:English
Published: Science Publications 2009
Subjects:
Online Access:http://irep.iium.edu.my/1253/1/Challenges_of_Hidden_Data_in_the_Unused_Area_Two_within_Executable_Files.pdf
_version_ 1796874753249640448
author Naji, Ahmed Wathik
Zaidan, A.A.
Zaidan, B.B.
author_facet Naji, Ahmed Wathik
Zaidan, A.A.
Zaidan, B.B.
author_sort Naji, Ahmed Wathik
collection IIUM
description Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process.
first_indexed 2024-03-05T22:28:57Z
format Article
id oai:generic.eprints.org:1253
institution International Islamic University Malaysia
language English
last_indexed 2024-03-05T22:28:57Z
publishDate 2009
publisher Science Publications
record_format dspace
spelling oai:generic.eprints.org:12532011-08-02T07:19:27Z http://irep.iium.edu.my/1253/ Challenges of hidden data in the unused area two within executable files Naji, Ahmed Wathik Zaidan, A.A. Zaidan, B.B. TK7885 Computer engineering Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process. Science Publications 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/1253/1/Challenges_of_Hidden_Data_in_the_Unused_Area_Two_within_Executable_Files.pdf Naji, Ahmed Wathik and Zaidan, A.A. and Zaidan, B.B. (2009) Challenges of hidden data in the unused area two within executable files. Journal of Computer Science, 5 (11). pp. 890-897. ISSN 1549-3636 http://thescipub.com/abstract/10.3844/jcssp.2009.890.897 10.3844/jcssp.2009.890.897
spellingShingle TK7885 Computer engineering
Naji, Ahmed Wathik
Zaidan, A.A.
Zaidan, B.B.
Challenges of hidden data in the unused area two within executable files
title Challenges of hidden data in the unused area two within executable files
title_full Challenges of hidden data in the unused area two within executable files
title_fullStr Challenges of hidden data in the unused area two within executable files
title_full_unstemmed Challenges of hidden data in the unused area two within executable files
title_short Challenges of hidden data in the unused area two within executable files
title_sort challenges of hidden data in the unused area two within executable files
topic TK7885 Computer engineering
url http://irep.iium.edu.my/1253/1/Challenges_of_Hidden_Data_in_the_Unused_Area_Two_within_Executable_Files.pdf
work_keys_str_mv AT najiahmedwathik challengesofhiddendataintheunusedareatwowithinexecutablefiles
AT zaidanaa challengesofhiddendataintheunusedareatwowithinexecutablefiles
AT zaidanbb challengesofhiddendataintheunusedareatwowithinexecutablefiles