New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique

The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary...

Full description

Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Gunawan, Teddy Surya, Zaidan, A.A., O-Khalifa, Othman, Zaidan, B.B., Al-Khateeb, Wajdi Fawzi Mohammed, Hameed, Shihab A.
Format: Article
Language:English
Published: IJCSNS 2009
Subjects:
Online Access:http://irep.iium.edu.my/421/1/New_Approach_of_Hidden_Data_in_the_portable_Executable_File.pdf
_version_ 1796874666563862528
author Naji, Ahmed Wathik
Gunawan, Teddy Surya
Zaidan, A.A.
O-Khalifa, Othman
Zaidan, B.B.
Al-Khateeb, Wajdi Fawzi Mohammed
Hameed, Shihab A.
author_facet Naji, Ahmed Wathik
Gunawan, Teddy Surya
Zaidan, A.A.
O-Khalifa, Othman
Zaidan, B.B.
Al-Khateeb, Wajdi Fawzi Mohammed
Hameed, Shihab A.
author_sort Naji, Ahmed Wathik
collection IIUM
description The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. The strength of the hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) in an execution file (EXE) without change the size of execution file. The new proposed system is able to embed information in an execution file without change the size of execution file. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.
first_indexed 2024-03-05T22:27:42Z
format Article
id oai:generic.eprints.org:421
institution International Islamic University Malaysia
language English
last_indexed 2024-03-05T22:27:42Z
publishDate 2009
publisher IJCSNS
record_format dspace
spelling oai:generic.eprints.org:4212012-01-10T04:03:50Z http://irep.iium.edu.my/421/ New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique Naji, Ahmed Wathik Gunawan, Teddy Surya Zaidan, A.A. O-Khalifa, Othman Zaidan, B.B. Al-Khateeb, Wajdi Fawzi Mohammed Hameed, Shihab A. QA75 Electronic computers. Computer science The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. The strength of the hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) in an execution file (EXE) without change the size of execution file. The new proposed system is able to embed information in an execution file without change the size of execution file. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file. IJCSNS 2009-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/421/1/New_Approach_of_Hidden_Data_in_the_portable_Executable_File.pdf Naji, Ahmed Wathik and Gunawan, Teddy Surya and Zaidan, A.A. and O-Khalifa, Othman and Zaidan, B.B. and Al-Khateeb, Wajdi Fawzi Mohammed and Hameed, Shihab A. (2009) New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique. International Journal of Computer Science and Network Security (IJCSNS), 9 (7). pp. 218-224. ISSN 1738-7906 http://paper.ijcsns.org/07_book/html/200907/200907030.html
spellingShingle QA75 Electronic computers. Computer science
Naji, Ahmed Wathik
Gunawan, Teddy Surya
Zaidan, A.A.
O-Khalifa, Othman
Zaidan, B.B.
Al-Khateeb, Wajdi Fawzi Mohammed
Hameed, Shihab A.
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
title New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
title_full New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
title_fullStr New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
title_full_unstemmed New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
title_short New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
title_sort new approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/421/1/New_Approach_of_Hidden_Data_in_the_portable_Executable_File.pdf
work_keys_str_mv AT najiahmedwathik newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique
AT gunawanteddysurya newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique
AT zaidanaa newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique
AT okhalifaothman newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique
AT zaidanbb newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique
AT alkhateebwajdifawzimohammed newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique
AT hameedshihaba newapproachofhiddendataintheportableexecutablefilewithoutchangethesizeofcarrierfileusingstatisticaltechnique