Faculty of Computer Science and Information Technology >
Masters Dissertations: Computer Science >
Please use this identifier to cite or link to this item:
|Title: ||Securing cover-file of hidden data using statistical technique and aes encryption algorithm|
|Keywords: ||Aesencryption algorithm|
|Issue Date: ||Jun-2009 |
|Publisher: ||University of Malaya|
|Abstract: ||The quick development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It becomes necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information.
Nowadays, protection system can be classified into more specific as hiding information and encrypting information or a combination between them. The strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be used in hiding and encrypting secret messages. Also there are many ways in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data.
A new system of information hiding is presented. The proposed system aim to hide information (data file) in any execution file (exe.file) and to make sure changes made to the file will not be detected and the functionality of the file is still functioning.
The proposed system includes two main functions; first is the process of hiding information in a Portable Executable File (exe.file), through the execution of four processes (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the process of extracting hidden information through three processes (specify the steno file, extract the information, and decryption of the information).
The testing result shows that the size of the hidden data does not depend on the size of the cover file; the result file does not make any conflict with anti-virus software and the exe.file still function as usual after the hiding process. The system is implemented by using Visual Basic.net.|
|Description: ||Dissertation (M.C.S.) -- Faculty of Computer Science & Information Technology, University of Malaya, 2009.|
|Appears in Collections:||Masters Dissertations: Computer Science|