<fmt:message key='jsp.layout.header-default.alt'/>  
 

DSpace@UM >
Faculty of Computer Science and Information Technology >
Masters Dissertations: Computer Science >

Please use this identifier to cite or link to this item: http://hdl.handle.net/1812/629

Title: Securing cover-file of hidden data using statistical technique and aes encryption algorithm
Authors: Aos.A.Z.Ansaef
Keywords: Aesencryption algorithm
Cover-file
Hidden data
Statistical technique
Issue Date: Jun-2009
Publisher: University of Malaya
Abstract: The quick development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It becomes necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Nowadays, protection system can be classified into more specific as hiding information and encrypting information or a combination between them. The strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be used in hiding and encrypting secret messages. Also there are many ways in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. A new system of information hiding is presented. The proposed system aim to hide information (data file) in any execution file (exe.file) and to make sure changes made to the file will not be detected and the functionality of the file is still functioning. The proposed system includes two main functions; first is the process of hiding information in a Portable Executable File (exe.file), through the execution of four processes (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the process of extracting hidden information through three processes (specify the steno file, extract the information, and decryption of the information). The testing result shows that the size of the hidden data does not depend on the size of the cover file; the result file does not make any conflict with anti-virus software and the exe.file still function as usual after the hiding process. The system is implemented by using Visual Basic.net.
Description: Dissertation (M.C.S.) -- Faculty of Computer Science & Information Technology, University of Malaya, 2009.
URI: http://dspace.fsktm.um.edu.my/handle/1812/629
Appears in Collections:Masters Dissertations: Computer Science

Files in This Item:

File Description SizeFormat
Abstract+Aknoledgment+Figures andTABELS.pdfAbstrac72.46 kBAdobe PDFView/Open
Appendex_A_.pdf45.32 kBAdobe PDFView/Open
Appendex_B_.pdf179.2 kBAdobe PDFView/Open
Chapter_1_.pdf51.35 kBAdobe PDFView/Open
Chapter_2_.pdf365.95 kBAdobe PDFView/Open
Chapter_3_.pdf874.44 kBAdobe PDFView/Open
Chapter_4_.pdf545.83 kBAdobe PDFView/Open
Chapter_5_.pdf213.71 kBAdobe PDFView/Open
Chapter_6_.pdf21.49 kBAdobe PDFView/Open
Name.pdfTitle9.21 kBAdobe PDFView/Open
refrences.pdf36.35 kBAdobe PDFView/Open


This item is protected by original copyright



Your Tags:

 

  © Copyright 2008 DSpace Faculty of Computer Science and Information Technology, University of Malaya . All Rights Reserved.
DSpace@UM is powered by MIT - Hawlett-Packard. More information and software credits. Feedback