• Sep 30, 2024 News!Vol.16, No. 3 has been published with online version.   [Click]
  • Jun 13, 2024 News!Vol.16, No. 2 has been published with online version.   [Click]
  • Mar 26, 2024 News!Vol.16, No. 1 has been published with online version.   [Click]
General Information
    • ISSN: 1793-8236 (Online)
    • Abbreviated Title Int. J. Eng. Technol.
    • Frequency:  Quarterly 
    • DOI: 10.7763/IJET
    • APC: 500 USD
    • Managing Editor: Ms. Shira. Lu 
    • Abstracting/ Indexing: Inspec (IET), CNKI Google Scholar, EBSCO, ProQuest, Crossref, Ulrich Periodicals Directory, Chemical Abstracts Services (CAS), etc.
    • E-mail: ijet_Editor@126.com
IJET 2010 Vol.2(1): 72-77 ISSN: 1793-8244
DOI: 10.7763/IJET.2010.V2.103

New Design for Information Hiding with in Steganography Using Distortion Techniques

Hamid. A. Jalab, A. A. Zaidan and B. B. Zaidan

Abstract—A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses , secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.

Dr. Hamid. A. Jalab- Senior Lecturer, Department of Computer Science & Information Technology, University Malaya, Kuala Lumpur, Malaysia, Email:hamidjalab@um.edu.my.
A. A. Zaidan – PhD Candidate on the Department of Electrical & Computer Engineering , Faculty of Engineering , Multimedia University , Cyberjaya, Malaysia and Email: aws.alaa@gmail.com or aws.alaa@gmail.com.
B. B. Zaidan – PhD Candidate on the Department of Electrical & Computer Engineering / Faculty of Engineering ,Multimedia University , Cyberjaya, Malaysia, bilal_bahaa@Hotmal.com.

[PDF]

Cite: Hamid. A. Jalab, A. A. Zaidan and B. B. Zaidan, "New Design for Information Hiding with in Steganography Using Distortion Techniques," International Journal of Engineering and Technology vol. 2, no. 1, pp. 72-77, 2010.

Copyright © 2008-2024. International Journal of Engineering and Technology. All rights reserved. 
E-mail: ijet_Editor@126.com