You are on page 1of 5

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 51

New Framework for High (Secure and Rate)


Data Hidden Within Quarter Space for
Executable File
Hamdan O. Alanazi, Prof. Dr. Mohd Sapiyan  
 
Abstract – The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding
secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to
pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. Also the previously
traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods
but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became
necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance
from system managers in an organization that requires the high level of security. This fact requires researches on new hiding
framework and cover objects which hidden information is embedded in. It is the result from the researches to embed information in
executable files, but when will use the executable file for cover they have challenge must be taken into consideration which is the
size of the cover file in the last research when we used the exe file as the cover was reached 28% from the size of cover file. In this
paper, a new information hiding framework is presented. The aim of the proposed framework is to hide information (data file) within
quarter space of execution file (EXEfile) to overcome the challenge that we have mentioned .Meanwhile, since the cover file might be
used to identify hiding information, the proposed framework considers overcoming this dilemma by using the execution file as a
cover file. As the results in features of the short-term responses were simulated, and indicated that the size of the hidden data does
depend on the size of the (Unused Area1+ Unused Area 2 +header file+ Image Pages; within the cover file which is approxmately
equaled to 38% of the size of the exe.file before the hiding process.

Index Terms— Steganography, Cryptography, Hidden Data, Encryption and Advance Encryption Standard (AES).
.

——————————      —————————— 

 Introduction specific as hiding information, encryption information,


and combination between hiding and encryption to
The populace involved in this area because, the quick increase in sequence safety [7],[17]. Information hiding is
development of multimedia and internet allows for wide a field of information security, and it includes methods of
allocation of digital media data. It becomes much easier to hiding the existence of information itself in a multiplicity
tidy up, modify and copy digital information [1]. Besides of media (multimedia)[8].
that, digital documents are also easy to reproduction and
distribute, consequently it will be faced by many
threatens [2]. It’s a large safekeeping and privacy matter.  Related Work
Another problem with digital essay is that untraceable
Nowadays, securing system is classified into more
modifications can be made with very simple and widely
specific as hiding data (Steganography) or encryption
available gear, which put the digital textile for evidential
data (Cryptography) or a combination between them.
purposes under question [3].With the large downpour of
Cryptography is the practice of ‘scrambling’ messages so
information and the development of the digital format, it
that even if detected, they are not easy to decipher. The
become necessary to find appropriate protection because
target of Steganography is to hide the message such that
of the consequence, accuracy and sympathy of the
the very existence of the hidden is ‘camouflaged’
information [4]. Until that time customary methods were
[9],[12],[13],[14]. However, the two techniques are not
adequate to protect the information, since its simplicity in
mutually exclusive. Steganography and Cryptography are
the past does not need difficult methods but with the
in fact complementary techniques. No matter how strong
progress of information technology, it become easy to
algorithm, if an encrypted message is exposed, it will be
attack systems, and detection of encryption methods
subject to cryptanalysis. As well, no matter how well
became necessary to find ways equivalent with the
covered a message is, it is always possible that it will be
contradictory methods used by hackers[5],[6],[7].
exposed [10],[16]. By combining Steganography with
Nowadays protection system confidential with additional
Cryptography we can hide the existence of an encrypted
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 52
message. By doing this, we make it far less likely that an  The question will be raised; will my research be able to
encrypted message is found. In addition, if a message hide undetectable information in executable files
covered through Steganography is discovered, the within (Unused Area1+ Unused Area 2 +header file+
explorer is still faced with the formidable task of Image Pages)?
deciphering it. Additionally, the strength of the
combination between hiding and encryption science is 1. FRAMEWORK CONCEPT
because of the non-existence of standard algorithms to be The concept of this system is summarized as the hiding of
used in (hiding and encryption) secret messages. Also data or any information in the Unused Area1+ Unused
there is randomness in hiding methods such as combining Area 2 + Image Pages + header file ; within an executable
several media (covers) with different methods to pass a file, consequently there is no role or custom (open-file,
secret message. Moreover, there is no formal method to be read, write, and close-file) in the operating system to
followed to discover a hidden data. It can be considered extract it. Another method to this operation would be
that Stilo et al. represent common techniques for the building the file managing procedure independently from
hidden information in executable files [17],[18]. These the operating system file handling routines[31],[32]. In
techniques make original files changed, so code signing this situation, there is need to replace the existing file
techniques that assurance the integrity of the code can be managing routines by developing a new function which
used for the detecting hidden information. However, it performs according to the needs, but while maintaining
becomes general phenomenon making executable files as the same exe.file names. The benefit of this method does
the level of using computer and computing environment not need any additional operations which are identified
has been raised. Also, it is not general to use code signing by the analysts, and it can be executed remotely and is
techniques [19],[20],[21]. They change program binaries suitable for network and internet applications. The
that have been in optimization, so the performance of the drawback of this method is that it needs to be physically
program binaries may fall. Also, the amount of installed (cannot be operated remotely). Because of this,
information to be embedded in executable files by using the first concept has been chosen in this paper
Silo and Hydan is limited under than 15% from the total [33][34][35][36][37][38][39][40].
cover size because these tools determine the number of
bytes to be hidden on the base of the size of the program
binaries [22]. Aws et al. change program, they implement 2. QUARTER SPACE STRUCTURE
a system computation among cryptography and
Steganography which embeds information within unused
The architecture of PE file is shown in Figure 1, there are
area 1 of exe.file. Then, Ahmed et al. change a new
four free areas in the PE file architecture which were used
technique of hidden data in the (Unused Area 2 within
for this framework, and these vacant spaces were chosen
exe.file) using computation among Cryptography and
for hiding the steganography because:
Steganography that files [10]. They have increased the
size of the hidden data. The size does depend on the size
1. The size of the free area 1 is same for all such files.
of the Unused Area1+ Unused Area 2 + Image Pages;
2. The size of the free area 2 is different for all such files.
within the cover file which is equal to 28% of the size of
3. The size of the image pages is different for all such files.
the exe.file before the hiding process. Using this
4. The size of the header file is different for all such files.
framework, the size may reach 38% of the size of the
exe.file before the hiding [23][24][25][26][27][28][29][30].
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 53

Fig1: The architecture of PE file

foremost I would like to thank “ALLAH” (SWT), most


3. CONCLUSION gracious and most merciful. I would like to thank Prof.
New framework chosen in this paper is the advanced Dr. Mohd Sapiyan for his continue support,
result from previous articles on the embedding encouragement and valuable discussions during my
information in executable files for hiding information. In research work. I also would like to express the deepest
addition, it has the powerful benefits that do not limit the appreciation to Professor Abdullah Ben Abdul-Rahman
amount of information to be concealed and chosen system Abdullah Al-Othman, Dr. Ali ibn Sulaiman Al-Attiyah
to be undetectable with anti virus software's and making and Prof. Dr. Mohammad Khalifa Al-Tamimi. My thanks
it imperceptible by any anti-virus software. One of the are also extended to Dr. Ali bin Abdullah Alafnan, Dr.
effective conclusions in of the proposed system is the Abdullah Alsbail, Dr. Muhammed Al Arifi, Dr. Musaed
detecting of the problems that are related to the size of AL-Jrrah, and Mr. Abdullah Alsbait. Dr.Khalid Alhazmi,
cover file, so the hiding method acts the relation among Mr. Seraj, Mr. Khalid and all the staff in the King Saud
the cover and the message independent, finally. The University especially in Applied Medical Science for their
encryption of the message adds the degree of security of unlimited support. Without their notes and suggestions
hiding technique which is used in the aimed system. this research would not have appeared. Finally, I would
like to express my sincere gratitude to my family for their
help and their unconditional support. A very special vote
ACKNOWLEDGEMENT
of thanks is due to my beloved mother.

This research was partially supported by the King Saud


University, Riyadh, Saudi Arabia, the University of
Malaya, Kuala Lumpur, Malaysia and “Al-Madinah
International University”, Shah Alam, Malaysia. First and
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 54
Approaches: An Overview ”, Journal of Applied Sciences, Vol.10 ,
Issue.16 , ISSN: 1812-5654, 2010, P.P 1825-1833.
[11] A.A.Zaidan, B.B.Zaidan, Fazidah Othman, “New Technique of
AUTHOR’S PROFILE Hidden Data in PE-File with in Unused Area One”, International
Journal of Computer and Electrical Engineering (IJCEE), Vol.1, No.5,
HAMDAN ALANAZI: He has obtained ISSN: 1793-8163, p.p 642-650. , December (2009), Singapore.
his bachelor’s degree from the King Saud [12] A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of
University, Riyadh, Kingdom of Saudi Hidden Data Using Statistical Technique and AES Encryption
Algorithm", World Academy of Science, Engineering and Technology
Arabia. He worked as a lecturer at the (WASET), International Journal of Science, Engineering and
Health College in the Ministry of Health Technology, Vol.54, ISSN: 2070-3724, P.P 468-479, June (2009),
in Saudi Arabia, and then worked as a Paris, France.
lecturer at the King Saud University. [13] A.A.Zaidan, B.B.Zaidan, “Novel Approach for High Secure Data
Currently, he is a Master’s candidate at the Faculty of Hidden in MPEG Video Using Public Key Infrastructure”,
International Journal of Computer and Network Security, 2009, Vol.1,
Computer Science & Information Technology at the No.1, ISSN: 1985-1553, P.P 71-76, 30 October, Malaysia.
University of Malaya in Kuala Lumpur, Malaysia. He has [14] A.A.Zaidan, B.B.Zaidan, Hamid.A.Jalab,“ A New System for Hiding
published many articles. He is has been reviewed in many Data within (Unused Area Two + Image Page) of Portable Executable
journals. His research interests are in Cryptography, File using Statistical Technique and Advance Encryption Standared “,
International Journal of Computer Theory and Engineering (IJCTE),
Steganography, Digital Watermarking, Network Security, 2010, VOL 2, NO 2, P.P 220-227, ISSN:1793-8201, Singapore.
Artificial Intelligence, pattern recognitions, signal [15] Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan .T. Madhloom, B.B
processing and image processing and Medical Applications. Zaidan, A.A Zaidan,” Novel Approach for High Secure and High Rate
Data Hidden in the Image Using Image Texture Analysis”,
International Journal of Engineering and Technology (IJET) ,
REFERENCES Published by: Engg Journals Publications, ISSN:0975-4042,
Vol.1,NO.2,P.P 63-69, 2009, India. (Computer Science Directory)
[1] A.A.Zaidan, B.B.Zaidan, Ali K. Hmood, Hamid A. Jalab,” Investigate [16] Hamdan. Alanazi, Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan, “New
the Capability of Applying Hidden Data in Text File: An Overview”, Frame Work of Hidden Data with in Non Multimedia File”,
Journal of Applied Sciences, Vol.10, Issue.17, ISSN: 1812-5654, International Journal of Computer and Network Security, 2010, Vol.2,
2010, P.P 1916-1922. No.1, ISSN: 1985-1553, P.P 46-54, 30 January, Malaysia.
[2] A.A.Zaidan, B.B.Zaidan, Ali K. Hmood, Hamid A. Jalab, “An [17] A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O. Khalifa, “
Overview: Theoretical and Mathematical Perspectives for Advance Novel Approach of Hidden Data in the (Unused Area 2 within EXE
Encryption Standared (AES)/Rijndael”, Journal of Applied Sciences, File) Using Computation Between Cryptography and Steganography
Vol.10, Issue.18, ISSN: 1812-5654, 2010, P.P 2161-2167. ”, International Journal of Computer Science and Network
[3] A.W.Naji, A.A.Zaidan, B.B.Zaidan, “Challenges of Hidden Data in Security (IJCSNS) , Vol.9, No.5 , ISSN : 1738-7906, pp. 294-300, 30
the Unused Area Two within Executable Files”, Journal of Computer May (2009), Seoul, Korea.
Science, ISSN: 1549-3636, 2009, Vol.5, No.11, P.P 890-897, New [18] Alaa Taqa, A.A Zaidan, B.B Zaidan ,“New Framework for High
York, USA, 2010. Secure Data Hidden in the MPEG Using AES Encryption Algorithm”,
[4] B.B.Zaidan, A.A.Zaidan, Ali K. Hmood, Hamid A. Jalab, “On the International Journal of Computer and Electrical Engineering
differences between Hiding Information and Cryptography (IJCEE),Vol.1 ,No.5, ISSN: 1793-8163, p.p.566-571 , December
Techniques: An Overview”, Journal of Applied Sciences, Vol.10, (2009). Singapore.
Issue.15, ISSN: 1812-5654, 2010, P.P 1650-1655. [19] B.B Zaidan , A.A Zaidan ,Alaa Taqa , Fazidah Othman ,“ Stego-
[5] Ali K.Hmood, B.B.Zaidan, A.A.Zaidan, Hamid A. Jalab, “An Image Vs Stego-Analysis System”, International Journal of Computer
Overview on Hiding Information Technique in Images”, Journal of and Electrical Engineering (IJCEE),Vol.1 ,No.5 , ISSN: 1793-8163,
Applied Sciences, Vol.10, Issue.18, ISSN: 1812-5654, 2010, P.P pp.572-578 , December (2009), Singapore.
2094-2100. [20] A.W. Naji, Teddy S. Gunawan, A.A.Zaidan, Othman O. Khalifa,
[6] Ali K. Hmood, Hamid A. Jalab, Z.M Kasirun, A.A.Zaidan, B.B.Zaidan, Wajdi F. Al-Khateeb,
B.B.Zaidan, “Hiding Data in Video File: An Overview”, Journal of Shihab A. Hameed, “ New Approach of Hidden Data in the portable
Applied Sciences, Vol.10, Issue.15, ISSN: 1812-5654, 2010, P.P Executable File without Change the Size of Carrier File Using
1644-1649. Statistical Technique ”, International Journal of Computer Science and
Network Security (IJCSNS) , Vol.9, No.7 , ISSN : 1738-7906, pp.
[7] Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B.Zaidan,
218-224, 30 July (2009), Seoul, Korea.
A.A.Zaidan,"A Novel Embedding Method to Increase Capacity of
LSB Audio Steganography Using Noise Gate Software Logic [21] Hamid.A.Jalab, A.A Zaidan, B.B Zaidan, “New Design for
Algorithm", Journal of Applied Sciences, Vol.10, Issue 1, ISSN: Information Hiding with in Steganography Using Distortion
1812-5654, 2010, P.P 59-64 . Techniques”, International Journal of Engineering and Technology
(IJET)), Vol 2, No. 1, ISSN: 1793-8236, P.P 72-77,Feb (2010),
[8] Hayan T. Madhloom, Sameem Abdul Kareem, Hany Ariffin, A.A
Singapore.
Zaidan, Hamdan.O.Alanazi, B.B Zaidan,“ An Automated White
Blood Cell Nucleus Localization and Segmentation Using Image [22] A.W. Naji, Shihab A. Hameed, B.B.Zaidan, Wajdi F. Al-Khateeb,
Arithmetic and Automatic Threshold ”, Journal of Applied Sciences, Othman O. Khalifa, A.A.Zaidan and Teddy S. Gunawan, “ Novel
Vol.10 , Issue.11 , ISSN: 1812-5654, 2010, P.P 959-966 . Framework for Hidden Data in the Image Page within Executable File
Using Computation between Advance Encryption Standared and
[9] Mohamed Abomhara, Omar Zakaria, Othman O. Khalifa, A.A.Zaidan,
Distortion Techniques”, International Journal of Computer Science
B.B.Zaidan, Hamdan.O.Alanazi, “Overview: Suitability of Using
and Information Security (IJCSIS), Vol. 3, No 1, ISSN: 1947-5500,
Symmetric Key to Secure Multimedia Data “, Journal of Applied
P.P 73-78,3 Aug 2009, USA.
Sciences. Vol.10, Issue.15, ISSN: 1812-5654, 2010, P.P 1656-1661.
[23] M. Abomhara, Omar Zakaria, Othman O. Khalifa , A.A.Zaidan,
[10] Ali K. Hmood , Hamid A. Jalab, Z.M Kasirun, B.B Zaidan , A.A
B.B.Zaidan, “Enhancing Selective Encryption for H.264/AVC Using
Zaidan, “ On the Capacity and Security of Steganography
Advance Encryption Standard “, International Journal of Computer
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 55
and Electrical Engineering (IJCEE), P.P 223-229, ISSN: 1793- Engineering and Technology (WASET), ), indexed by Thomson
8198,Vol.2 , NO.2, April 2010, Singapore. Reuters (ISI), SCIRUS, Google Scholar, Engineering Index
[24] Md. Rafiqul Islam, A.W. Naji, A.A.Zaidan, B.B.Zaidan “ New (Compendex), EBSCO, GALE, DOAJ, INTUTE, Scientific Commons
System for Secure Cover File of Hidden Data in the Image Page and Electronic Journals Library), Vol.56, ISSN:2070-3724, P.P 498-
within Executable File Using Statistical Steganography Techniques”, 502, 26-28 August (2009), Singapore.
International Journal of Computer Science and Information Security [35] Mohamed Elsadig Eltahir, Laiha Mat Kiah, B.B.Zaidan, A.A.Zaidan,"
(IJCSIS), ISSN: 1947-5500, P.P 273-279,Vol.7 , NO.1, January 2010, High Rate Video Streaming Steganography", International Conference
USA. on Future Computer and Communication (ICFCC09), Listed in IEEE
[25] Hamid.A.Jalab, A.A Zaidan and B.B Zaidan,” Frame Selected Xplore and be indexed by both EI (Compendex) and ISI Thomson
Approach for Hiding Data within MPEG Video Using Bit Plane (ISTP), Vol.12, Session 10, P.P 672-675, ISBN:978-0-7695-3591-3,
Complexity Segmentation”, Journal of Computing (JOC), Vol.1, Issue April 3 (2009), Kuala Lumpur, Malaysia.
1, ISSN: 2151-9617, P.P 108-113, December 2009, New York, USA. [36] A.W. Naji,Teddy S. Gunawan and Shihab A. Hameed, B.B Zaidan,
[26] Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan and A.A Zaidan " “Stego-Analysis Chain, Session One” Investigations on
Hamdan.O.Alanazi,” Overview: Main Fundamentals for Steganography Weakness Vs Stego-Analysis System for Multimedia
Steganography”, Journal of Computing (JOC), Vol.2, Issue 3, ISSN: File ", International Conference on IACSIT Spring Conference
2151-9617, P.P 158-165, March 2010, New York, USA. (IACSIT-SC09), Advanced Management Science (AMS), Listed in
IEEE Xplore and be indexed by both EI (Compendex) and ISI
[27] Hamdan.O.Alanazi, A.A.Zaidan, B.B.Zaidan, Hamid A.Jalab and Thomson (ISTP), Session 9, P.P 393-397 , ISBN:978-7695-3653-8,
Zaidoon Kh. AL-Ani,” New Classification Methods for Hiding April 17 (2009) , Singapore.
Information into Two Parts: Multimedia Files and Non Multimedia
Files”, Journal of Computing (JOC), Vol.2, Issue 3, ISSN: 2151-9617, [37] A.W.Naji, Shihab A. Hameed, Md Rafiqul Islam, B. B. Zaidan, Teddy
P.P 144-152, March 2010, New York, USA. S. Gunawan, and A. A. Zaidan " “Stego-Analysis Chain, Session
Two” Novel Approach of Stego-Analysis System for Image File ",
[28] Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab,
International Conference on IACSIT Spring Conference (IACSIT-
M.Shabbir and Y. Al-Nabhani,” New Comparative Study Between
SC09), Advanced Management Science (AMS), Listed in IEEE
DES, 3DES and AES within Nine Factors”, Journal of Computing
Xplore and be indexed by both EI (Compendex) and ISI Thomson
(JOC), Vol.2, Issue 3, ISSN: 2151-9617, P.P 152-157, March 2010,
(ISTP), Session 9, P.P 398-401, ISBN:978-7695-3653-8, April 17
New York, USA.
(2009), Singapore.
[29] A.A.Zaidan, Fazidah. Othman, B.B.Zaidan, R.Z.Raji,
[38] Fazidah Othman, Miss.Laiha.Maktom, A.Y.Taqa, B.B.Zaidan,
Ahmed.K.Hasan, and A.W.Naji," Securing Cover-File without
A.A.Zaidan, "An Extensive Empirical Study for the Impact of
Limitation of Hidden Data Size Using Computation between
Increasing Data Hidden on the Images Texture", International
Cryptography and Steganography ", World Congress on Engineering
Conference on Future Computer and Communication (ICFCC 09),
2009 (WCE), The 2009 International Conference of Computer
Listed in IEEE Xplore and be indexed by both EI (Compendex) and
Science and Engineering, Proceedings of the International Multi
ISI Thomson (ISTP), Vol.12, Session 7, P.P 477-481, ISBN:978-0-
Conference of Engineers and Computer Scientists 2009, ISBN: 978- 7695-3591-3, April 3 (2009), Kuala Lumpur, Malaysia.
988-17012-5-1, Vol.I, p.p259-265, 1-3 July (2009), London, UK.
[39] Yahya AL-Nabhani, A.A.Zaidan, B.B.Zaidan, Hamid A.Jalab,
Hamdan.O.Alanazi, “A New System for Hidden Data within Header
[30] A.A.Zaidan, A.W. Naji, Shihab A. Hameed, Fazidah Othman and Space for EXE-File Using Object Oriented Technique”, 3rd IEEE
B.B.Zaidan, " Approved Undetectable-Antivirus Steganography for International Conference on Computer Science and Information
Multimedia Information in PE-File ",International Conference on Technology (IEEE ICCSIT 2010), Listed in IEEE Xplore and be
IACSIT Spring Conference (IACSIT-SC09) , Advanced Management indexed by both EI (Compendex) and ISI Thomson (ISTP), ISBN:
Science (AMS), Listed in IEEE Xplore and be indexed by both EI 978-1-4244-5537-9,Session 1, Vol.7, P.P 9-13, 9 – 11 July (2010),
(Compendex) and ISI Thomson (ISTP), Session 9, P.P 425-429, Chengdu, China.
ISBN:978-7695-3653-8 , April 17 (2009), Singapore.
[40] B.B Zaidan, A.A.Zaidan, Fazidah Othman “Enhancement of the
[31] A.A.Zaidan, B.B.Zaidan, M.M.Abdulrazzaq, R.Z.Raji, and
Amount of Hidden Data and the Quality of Image", Malaysia
S.M.Mohammed," Implementation Stage for High Securing Cover-
Education Security (MyEduSec08), Grand Continental Hotel, 18 Aug
File of Hidden Data Using Computation Between Cryptography and (2008), Kuala Trengano, Malaysia.
Steganography", International Conference on Computer Engineering
and Applications (ICCEA09), Telecom Technology and Applications
(TTA), indexing by Nielsen, Thomson ISI (ISTP), IACSIT Database,
British Library and EI Compendex, Vol.19, Session 6, p.p 482-489,
ISBN: 978-1-84626-017-9,June 6 (2009), Manila, Philippines.
[32] B.B.Zaidan, A.A.Zaidan, Fazidah. Othman, Ali Rahem, “Novel
Approach of Hidden Data in the (Unused Area 1 within EXE File)
Using Computation between Cryptography and Steganography”,
Proceeding of World Academy of Science Engineering and
Technology (WASET), Vol.54, ISSN: 2070-3724, June (2009), Paris,
France
[33] A.W. Naji, A.A.Zaidan, B.B.Zaidan, Ibrahim A.S.Muhamadi, “New
Approach of Hidden Data in the portable Executable File without
Change the Size of Carrier File Using Distortion Techniques”,
Proceeding of World Academy of Science Engineering and
Technology (WASET), indexed by Thomson Reuters (ISI), SCIRUS,
Google Scholar, Engineering Index (Compendex), EBSCO, GALE,
DOAJ, INTUTE, Scientific Commons and Electronic Journals
Library),Vol.56, ISSN:2070-3724, P.P 493-497, 26-28 August (2009),
Singapore.
[34] A.W. Naji, A.A.Zaidan, B.B.Zaidan, Ibrahim A.S.Muhamadi, “Novel
Approach for Cover File of Hidden Data in the Unused Area Two
within EXE File Using Distortion Techniques and Advance
Encryption Standard.”, Proceeding of World Academy of Science

You might also like