Conceal existence of encoded data system (CEEDS)

dc.contributor.authorAl-Anni, Maad Kamal
dc.contributor.authorAlsaadi, Husam Ibrahiem Husain
dc.contributor.authorAlmuttairi, Rafah M.
dc.contributor.authorBayat, Oğuz
dc.contributor.authorUçan, Osman Nuri
dc.date.accessioned2021-05-15T12:41:18Z
dc.date.available2021-05-15T12:41:18Z
dc.date.issued2019
dc.departmentMühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.descriptionInternational Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) -- SEP 22-23, 2019 -- Univ Bahrain, Sakhier, BAHRAIN
dc.description.abstractThe awareness of importance of secure sensitive Data, make growing need for the technology to store or transmission data over the network with complete confidentiality. Steganography can be used as a means of transmitting sensitive data, but the use of the simple and general domain of information hiding techniques can lead to discover that something has been hidden quite easily where the interceptor expects a hidden message inside a file. Reliability methods have been consistently improved. The power of concealment comes when the encrypted data is hidden in a file that interceptor cannot predict. To conceal the terrible existence of the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data is hidden in a file that interceptor cannot predict. To hide the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data and then embedded it in the Excel sheet, implying to have a color pallet which allow us to scattering the encrypted data upon Cover Excel File (CEF) with a slightly changes in Background Color Schema. The change is so clear that the brute force, that isn't specifically trying to find which is improbable to notice the change, has no chance to guess any changes by visual look.en_US
dc.identifier.isbn978-1-7281-3012-5
dc.identifier.scopus2-s2.0-85076422623
dc.identifier.scopusqualityN/A
dc.identifier.urihttps://hdl.handle.net/20.500.12939/782
dc.identifier.wosWOS:000522258800009
dc.identifier.wosqualityN/A
dc.indekslendigikaynakWeb of Science
dc.indekslendigikaynakScopus
dc.institutionauthorUçan, Osman Nuri
dc.institutionauthorBayat, Oğuz
dc.language.isoen
dc.publisherIeeeen_US
dc.relation.ispartof2019 International Conference on Innovation and Intelligence For Informatics, Computing, and Technologies (3Ict)
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectPlausible Deniabilityen_US
dc.subjectExcel Sheetsen_US
dc.subjectColor Palleten_US
dc.subjectThe Secret Messageen_US
dc.subjectCryptography Steganography (The Hiding Data)en_US
dc.titleConceal existence of encoded data system (CEEDS)
dc.typeConference Object

Dosyalar