High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm
Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
[1] Avedissian, L.Z," Image in Image Steganography System", Ph.D.Thesis,
Informatics Institute for Postgraduate Studies (IIIPS), University of
Technology, Baghdad, Iraq, 2008.
[2] Zaidan, B. B., Zaidan A. A. and Othman F., "Enhancement of the
amount of hidden data and the quality of image," Faculty of Computer
Science and Information Technology, University of Malaya, Kuala
Lumpur, Malaysia,2008.
[3] C. J. S. B," Modulation and Information Hiding in Images", of Lecture
Notes in Computer Science, University of Technology, Malaya, Vol.
1174, pp.207-226, 2007.
[4] Clelland, C.T.R, V.P & Bancroft, "Hiding Messages in DNAMicroDots",
International Symposium on Industrial Electronics (ISIE) , University of
Indonesia , Indonesia, Vol. 1, pp.315-327, 2007.
[5] Davern, P.S, M.G, "Steganography It History and Its Application to
Computer Based Data Files", School of Computer Application (SCA),
Dublin City University. Working Paper. Studies (WPS), Baghdad, Iraq,
2007.
[6] Dorothy, E.R, D.K, "Cryptography and Data Security", IEEE
International Symposium on Canada Electronics (ISKE), University of
Canada, Canada, Vol.6, pp.119-122, 2006,
[7] Johnson, N. F. S. D, Z., "Information Hiding: Steganography and
Watermarking-Attacks and Countermeasures", Center for Secure
Information Systems (CSIS), Boston/Dordrecht/London, George Mason
University, 2006.
[8] Katzenbeisser, S. P., A. P, "Information Hiding Techniques for
Steganography and Digital watermarking", available from: Artech house
pub, 2005.
[9] G. Doërr and J. Dugelay, "Security pitfalls of frame -by-frame
approaches to video watermarking," IEEE Transactions on Signal
Processing, vol. 52, 2004, pp. 2955-2964.
[10] Mehdi Kharrazi, Husrev T. Sencar and Nasir Menon, "Image
steganography: concepts and practice," Lecture Notes on Computer
Science, vol. 2939, 2004, pp. 204-211.
[11] Katzenbeisser S. & Petitcolas, F. A., "Information Hiding Techniques for
Steganography and Digital Watermarking", Artech House, USA, 2001.
[12] Mbaugh, S. E., "Computer vision and image processing, a practical
approach using CVIP tools," Ph.D., 1998.
[1] Avedissian, L.Z," Image in Image Steganography System", Ph.D.Thesis,
Informatics Institute for Postgraduate Studies (IIIPS), University of
Technology, Baghdad, Iraq, 2008.
[2] Zaidan, B. B., Zaidan A. A. and Othman F., "Enhancement of the
amount of hidden data and the quality of image," Faculty of Computer
Science and Information Technology, University of Malaya, Kuala
Lumpur, Malaysia,2008.
[3] C. J. S. B," Modulation and Information Hiding in Images", of Lecture
Notes in Computer Science, University of Technology, Malaya, Vol.
1174, pp.207-226, 2007.
[4] Clelland, C.T.R, V.P & Bancroft, "Hiding Messages in DNAMicroDots",
International Symposium on Industrial Electronics (ISIE) , University of
Indonesia , Indonesia, Vol. 1, pp.315-327, 2007.
[5] Davern, P.S, M.G, "Steganography It History and Its Application to
Computer Based Data Files", School of Computer Application (SCA),
Dublin City University. Working Paper. Studies (WPS), Baghdad, Iraq,
2007.
[6] Dorothy, E.R, D.K, "Cryptography and Data Security", IEEE
International Symposium on Canada Electronics (ISKE), University of
Canada, Canada, Vol.6, pp.119-122, 2006,
[7] Johnson, N. F. S. D, Z., "Information Hiding: Steganography and
Watermarking-Attacks and Countermeasures", Center for Secure
Information Systems (CSIS), Boston/Dordrecht/London, George Mason
University, 2006.
[8] Katzenbeisser, S. P., A. P, "Information Hiding Techniques for
Steganography and Digital watermarking", available from: Artech house
pub, 2005.
[9] G. Doërr and J. Dugelay, "Security pitfalls of frame -by-frame
approaches to video watermarking," IEEE Transactions on Signal
Processing, vol. 52, 2004, pp. 2955-2964.
[10] Mehdi Kharrazi, Husrev T. Sencar and Nasir Menon, "Image
steganography: concepts and practice," Lecture Notes on Computer
Science, vol. 2939, 2004, pp. 204-211.
[11] Katzenbeisser S. & Petitcolas, F. A., "Information Hiding Techniques for
Steganography and Digital Watermarking", Artech House, USA, 2001.
[12] Mbaugh, S. E., "Computer vision and image processing, a practical
approach using CVIP tools," Ph.D., 1998.
@article{"International Journal of Information, Control and Computer Sciences:50489", author = "A. A. Zaidan and Anas Majeed and B. B. Zaidan", title = "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", abstract = "Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.", keywords = "Cryptography, Steganography, Portable ExecutableFile.", volume = "3", number = "6", pages = "1494-12", }