Conceal existence of encoded data system (CEEDS)
dc.contributor.author | Al-Anni, Maad Kamal | |
dc.contributor.author | Alsaadi, Husam Ibrahiem Husain | |
dc.contributor.author | Almuttairi, Rafah M. | |
dc.contributor.author | Bayat, Oğuz | |
dc.contributor.author | Uçan, Osman Nuri | |
dc.date.accessioned | 2021-05-15T12:41:18Z | |
dc.date.available | 2021-05-15T12:41:18Z | |
dc.date.issued | 2019 | |
dc.department | Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.description | International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) -- SEP 22-23, 2019 -- Univ Bahrain, Sakhier, BAHRAIN | |
dc.description.abstract | The awareness of importance of secure sensitive Data, make growing need for the technology to store or transmission data over the network with complete confidentiality. Steganography can be used as a means of transmitting sensitive data, but the use of the simple and general domain of information hiding techniques can lead to discover that something has been hidden quite easily where the interceptor expects a hidden message inside a file. Reliability methods have been consistently improved. The power of concealment comes when the encrypted data is hidden in a file that interceptor cannot predict. To conceal the terrible existence of the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data is hidden in a file that interceptor cannot predict. To hide the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data and then embedded it in the Excel sheet, implying to have a color pallet which allow us to scattering the encrypted data upon Cover Excel File (CEF) with a slightly changes in Background Color Schema. The change is so clear that the brute force, that isn't specifically trying to find which is improbable to notice the change, has no chance to guess any changes by visual look. | en_US |
dc.identifier.isbn | 978-1-7281-3012-5 | |
dc.identifier.scopus | 2-s2.0-85076422623 | |
dc.identifier.scopusquality | N/A | |
dc.identifier.uri | https://hdl.handle.net/20.500.12939/782 | |
dc.identifier.wos | WOS:000522258800009 | |
dc.identifier.wosquality | N/A | |
dc.indekslendigikaynak | Web of Science | |
dc.indekslendigikaynak | Scopus | |
dc.institutionauthor | Uçan, Osman Nuri | |
dc.institutionauthor | Bayat, Oğuz | |
dc.language.iso | en | |
dc.publisher | Ieee | en_US |
dc.relation.ispartof | 2019 International Conference on Innovation and Intelligence For Informatics, Computing, and Technologies (3Ict) | |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Plausible Deniability | en_US |
dc.subject | Excel Sheets | en_US |
dc.subject | Color Pallet | en_US |
dc.subject | The Secret Message | en_US |
dc.subject | Cryptography Steganography (The Hiding Data) | en_US |
dc.title | Conceal existence of encoded data system (CEEDS) | |
dc.type | Conference Object |