• Mar 26, 2024 News!Vol.16, No. 1 has been published with online version.   [Click]
  • Jan 02, 2024 News!All papers in IJET will be publihsed article by article staring from 2024.
  • Nov 03, 2023 News!News | Vol.15, No. 4 has been published with online version.   [Click]
General Information
    • ISSN: 1793-8236 (Online)
    • Abbreviated Title Int. J. Eng. Technol.
    • Frequency:  Quarterly 
    • DOI: 10.7763/IJET
    • Managing Editor: Ms. Jennifer Zeng
    • Abstracting/ Indexing: Inspec (IET), CNKI Google Scholar, EBSCO, ProQuest, Crossref, etc.
    • E-mail: ijet_Editor@126.com
Editor-in-chief
IJET 2010 Vol.2(1): 72-77 ISSN: 1793-8244
DOI: 10.7763/IJET.2010.V2.103

New Design for Information Hiding with in Steganography Using Distortion Techniques

Hamid. A. Jalab, A. A. Zaidan and B. B. Zaidan

Abstract—A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses , secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.

Dr. Hamid. A. Jalab- Senior Lecturer, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, Email:hamidjalab@um.edu.my.
A. A. Zaidan – PhD Candidate on the Department of Electrical & Computer Engineering , Faculty of Engineering , Multimedia University , Cyberjaya, Malaysia and Email: aws.alaa@gmail.com or aws.alaa@gmail.com.
B. B. Zaidan – PhD Candidate on the Department of Electrical & Computer Engineering / Faculty of Engineering ,Multimedia University , Cyberjaya, Malaysia, bilal_bahaa@Hotmal.com.

[PDF]

Cite: Hamid. A. Jalab, A. A. Zaidan and B. B. Zaidan, "New Design for Information Hiding with in Steganography Using Distortion Techniques," International Journal of Engineering and Technology vol. 2, no. 1, pp. 72-77, 2010.

Copyright © 2008-2024. International Journal of Engineering and Technology. All rights reserved. 
E-mail: ijet_Editor@126.com