Corpus ID: 2936560

New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques

@article{Islam2009NewSF,
  title={New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques},
  author={Md. Rafiqul Islam and A. W. Naji and A. A. Zaidan and B. B. Zaidan},
  journal={ArXiv},
  year={2009},
  volume={abs/1002.2416}
}
  • Md. Rafiqul Islam, A. W. Naji, +1 author B. B. Zaidan
  • Published in ArXiv 2009
  • Computer Science
  • Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology,it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    1
    Twitter Mention

    Figures and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 12 CITATIONS

    Security analysis of steganalyzers

    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-5 OF 5 REFERENCES

    Implementation Stage for High Securing Cover-File of Hidden Data Using Computation Between Cryptography and Steganography", International Conference on Computer Engineering and Applications (ICCEA09)

    • A.A.Zaidan, B.B.Zaidan, M.M.Abdulrazzaq, R.Z.Raji, S.M.Mohammed
    • Telecom Technology and Applications (TTA),
    • 2009
    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File

    VIEW 2 EXCERPTS

    Novel Approach of Hidden Data in the ( Unused Area 2 within EXE File ) Using Computation Between Cryptography and Steganography ”

    • A. A. Zaidan Naji, B. B. Zaidan, A Shihab, O Othman
    • International Journal of Computer Science and Network Security ( IJCSNS )