메뉴 건너뛰기




Volumn 5, Issue 11, 2009, Pages 890-897

Challenges of hidden data in the unused area two within executable files

Author keywords

Cryptography Vs steganography; Hidden data within executable file

Indexed keywords


EID: 77952268534     PISSN: 15493636     EISSN: None     Source Type: Journal    
DOI: 10.3844/jcssp.2009.890.897     Document Type: Article
Times cited : (30)

References (6)
  • 1
    • 84859969075 scopus 로고    scopus 로고
    • Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography
    • Session 6
    • Zaidan, A.A., B.B. Zaidan, M.M. Abdulrazzaq, R.Z. Raji and S.M. Mohammed, 2009. Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography. Int. Assoc. Comput. Sci. Inform. Technol., 20, Session 6, p.p 482-489.. http://WWW.IACSIT.ORG andWww.WordAcademicPress.com
    • (2009) Int. Assoc. Comput. Sci. Inform. Technol. , vol.20 , pp. 482-489
    • Zaidan, A.A.1    Zaidan, B.B.2    Abdulrazzaq, M.M.3    Raji, R.Z.4    Mohammed, S.M.5
  • 3
    • 24944519882 scopus 로고    scopus 로고
    • Steganography for executable and code transformation signatures
    • May 24, Springer Berlin, Heidelberg
    • Anckaert, B.B. De Sutter, D. Chanet and K. De Bosschere, 2005. Steganography for executable and code transformation signatures. Proceedings of the 7th Information Security and Cryptology, May 24, Springer Berlin, Heidelberg, pp: 425-439. http://www.springerlink.com/content/vbxjdapj9g25agel/
    • (2005) Proceedings of the 7th Information Security and Cryptology , pp. 425-439
    • Anckaert, B.B.1    De Sutter, D.C.2    De Bosschere, K.3
  • 4
    • 70449563262 scopus 로고    scopus 로고
    • Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography
    • June 24-26, Academic and Scientific Research Organizations, Paris, France
    • Zaidan, B.B., Zaidan. A.A, F. Othman and A. Rahem, 2009. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography. Proceeding of the International Conference on Cryptography, Coding and Information Security, June 24-26, Academic and Scientific Research Organizations, Paris, France, pp: 1-22. http://www.waset.org/programs/Paris09.pdf
    • (2009) Proceeding of the International Conference on Cryptography, Coding and Information Security , pp. 1-22
    • Zaidan, B.B.1    Zaidan, A.A.2    Othman, F.3    Rahem, A.4
  • 5
    • 77952266986 scopus 로고    scopus 로고
    • Novel approach of hidden data in the unused area 2 within exe file using computation between cryptography and steganography
    • Naji, A.W., Zaidan.A.A. Zaidan.B.B. A. Shihab and O.O. Khalifa, 2009. Novel approach of hidden data in the unused area 2 within exe file using computation between cryptography and steganography. Int. J. Comput. Sci. Network Secur., 9: 294-300. http://paper.ijcsns.org/07_book/200905/20090539.pdf
    • (2009) Int. J. Comput. Sci. Network Secur. , vol.9 , pp. 294-300
    • Naji, A.W.1    Zaidan, A.A.2    Shihab Zaidan, B.B.A.3    Khalifa, O.O.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.