Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm

Authors: A. A. Zaidan, Anas Majeed, B. B. Zaidan

Abstract:

Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It-s a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). The system has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.

Keywords: Cryptography, Steganography, Portable ExecutableFile.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1055032

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1421

References:


[1] Avedissian, L.Z," Image in Image Steganography System", Ph.D.Thesis, Informatics Institute for Postgraduate Studies (IIIPS), University of Technology, Baghdad, Iraq, 2008.
[2] Zaidan, B. B., Zaidan A. A. and Othman F., "Enhancement of the amount of hidden data and the quality of image," Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia,2008.
[3] C. J. S. B," Modulation and Information Hiding in Images", of Lecture Notes in Computer Science, University of Technology, Malaya, Vol. 1174, pp.207-226, 2007.
[4] Clelland, C.T.R, V.P & Bancroft, "Hiding Messages in DNAMicroDots", International Symposium on Industrial Electronics (ISIE) , University of Indonesia , Indonesia, Vol. 1, pp.315-327, 2007.
[5] Davern, P.S, M.G, "Steganography It History and Its Application to Computer Based Data Files", School of Computer Application (SCA), Dublin City University. Working Paper. Studies (WPS), Baghdad, Iraq, 2007.
[6] Dorothy, E.R, D.K, "Cryptography and Data Security", IEEE International Symposium on Canada Electronics (ISKE), University of Canada, Canada, Vol.6, pp.119-122, 2006,
[7] Johnson, N. F. S. D, Z., "Information Hiding: Steganography and Watermarking-Attacks and Countermeasures", Center for Secure Information Systems (CSIS), Boston/Dordrecht/London, George Mason University, 2006.
[8] Katzenbeisser, S. P., A. P, "Information Hiding Techniques for Steganography and Digital watermarking", available from: Artech house pub, 2005.
[9] G. Doërr and J. Dugelay, "Security pitfalls of frame -by-frame approaches to video watermarking," IEEE Transactions on Signal Processing, vol. 52, 2004, pp. 2955-2964.
[10] Mehdi Kharrazi, Husrev T. Sencar and Nasir Menon, "Image steganography: concepts and practice," Lecture Notes on Computer Science, vol. 2939, 2004, pp. 204-211.
[11] Katzenbeisser S. & Petitcolas, F. A., "Information Hiding Techniques for Steganography and Digital Watermarking", Artech House, USA, 2001.
[12] Mbaugh, S. E., "Computer vision and image processing, a practical approach using CVIP tools," Ph.D., 1998.