High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm

Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It-s a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). The system has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.




References:
[1] Avedissian, L.Z," Image in Image Steganography System", Ph.D.Thesis,
Informatics Institute for Postgraduate Studies (IIIPS), University of
Technology, Baghdad, Iraq, 2008.
[2] Zaidan, B. B., Zaidan A. A. and Othman F., "Enhancement of the
amount of hidden data and the quality of image," Faculty of Computer
Science and Information Technology, University of Malaya, Kuala
Lumpur, Malaysia,2008.
[3] C. J. S. B," Modulation and Information Hiding in Images", of Lecture
Notes in Computer Science, University of Technology, Malaya, Vol.
1174, pp.207-226, 2007.
[4] Clelland, C.T.R, V.P & Bancroft, "Hiding Messages in DNAMicroDots",
International Symposium on Industrial Electronics (ISIE) , University of
Indonesia , Indonesia, Vol. 1, pp.315-327, 2007.
[5] Davern, P.S, M.G, "Steganography It History and Its Application to
Computer Based Data Files", School of Computer Application (SCA),
Dublin City University. Working Paper. Studies (WPS), Baghdad, Iraq,
2007.
[6] Dorothy, E.R, D.K, "Cryptography and Data Security", IEEE
International Symposium on Canada Electronics (ISKE), University of
Canada, Canada, Vol.6, pp.119-122, 2006,
[7] Johnson, N. F. S. D, Z., "Information Hiding: Steganography and
Watermarking-Attacks and Countermeasures", Center for Secure
Information Systems (CSIS), Boston/Dordrecht/London, George Mason
University, 2006.
[8] Katzenbeisser, S. P., A. P, "Information Hiding Techniques for
Steganography and Digital watermarking", available from: Artech house
pub, 2005.
[9] G. Doërr and J. Dugelay, "Security pitfalls of frame -by-frame
approaches to video watermarking," IEEE Transactions on Signal
Processing, vol. 52, 2004, pp. 2955-2964.
[10] Mehdi Kharrazi, Husrev T. Sencar and Nasir Menon, "Image
steganography: concepts and practice," Lecture Notes on Computer
Science, vol. 2939, 2004, pp. 204-211.
[11] Katzenbeisser S. & Petitcolas, F. A., "Information Hiding Techniques for
Steganography and Digital Watermarking", Artech House, USA, 2001.
[12] Mbaugh, S. E., "Computer vision and image processing, a practical
approach using CVIP tools," Ph.D., 1998.