Securing cover-file of hidden data using statistical technique and aes encryption algorithm

Aos, A.Z.Ansaef (2009) Securing cover-file of hidden data using statistical technique and aes encryption algorithm. Masters thesis, University of Malaya.

[img] PDF
Abstract+Aknoledgment+Figures andTABELS.pdf

Download (74kB)
[img] PDF

Download (46kB)
[img] PDF

Download (183kB)
[img] PDF

Download (52kB)
[img] PDF

Download (374kB)
[img] PDF

Download (895kB)
[img] PDF

Download (558kB)
[img] PDF

Download (218kB)
[img] PDF

Download (22kB)
[img] PDF

Download (-1B)
[img] PDF

Download (-1B)


The quick development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It becomes necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Nowadays, protection system can be classified into more specific as hiding information and encrypting information or a combination between them. The strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be used in hiding and encrypting secret messages. Also there are many ways in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. A new system of information hiding is presented. The proposed system aim to hide information (data file) in any execution file (exe.file) and to make sure changes made to the file will not be detected and the functionality of the file is still functioning. The proposed system includes two main functions; first is the process of hiding information in a Portable Executable File (exe.file), through the execution of four processes (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the process of extracting hidden information through three processes (specify the steno file, extract the information, and decryption of the information). The testing result shows that the size of the hidden data does not depend on the size of the cover file; the result file does not make any conflict with anti-virus software and the exe.file still function as usual after the hiding process. The system is implemented by using Visual

Item Type: Thesis (Masters)
Subjects: Z Bibliography. Library Science. Information Resources > Z665 Library Science. Information Science
Date Deposited: 16 Jul 2013 02:32
Last Modified: 16 Jul 2013 02:32

Actions (login required)

View Item View Item