Thursday, 21 May 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON SYSTEMS
Transactions ID Number: 32-509
Full Name: Aos Zaidan
Position: Ph.D. Candidate
Age: ON
Sex: Male
Address: D-9-4, DELIMA, BT5, JALAN KLANG LAMA, 58200 KUALA LUMPUR,MALAYSIA
Country: MALAYSIA
Tel: +60172452457
Tel prefix:
Fax:
E-mail address: aws.alaa@yahoo.com
Other E-mails: aws_alaa_2008@yahoo.com
Title of the Paper: New Technique for Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm.
Authors as they appear in the Paper: Aws Alaa , Bilal Bahaa.
Email addresses of all the authors: aws.alaa@yahoo.com,bilal_bahaa@hotmail.com
Number of paper pages: 12
Abstract: ABSTRACT---Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It's a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods!
to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno fi!
le, extract the information, and decryption of the information). The s
ystem has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.
Keywords: Keywords: (Cryptography, Steganography, Portable Executable File, Statistical Technique, Advance Encryption Standared).
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress: university of malay , kula lumpur , awsalaa@perdana.um.edu.my
IP ADDRESS: 116.206.140.246