Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm

نویسندگان

چکیده

Steganography is the practice of hiding a message or information within another file, such as an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly available for intelligence gathering purposes. In this research, asymmetric key algorithm will be applied to steganography method, 10 images with different sizes and dimensions. Images tested are in tiff, gif, png, jpg, bmp format. A combination could involve analyzing decoding found on platforms, social media, uncover hidden messages. On other hand, can also used protect sensitive from prying eyes. Overall, Symmetric Key Algorithm powerful tool both secure communication. Here work, malware developed, that victim’s machine exploited. Later, analysis done via freely OSINTs find out which best gives results. have been very helpful identifying whether URLs files malicious not. But how binding makes it difficult identify they not being analyzed work. The shows VirusTotal has greater number engines detect whereas others don’t variety malware. Also, when comes afore easier was after

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Steganography Using Modified Kekre Algorithm

The main goal of steganography is to hide information in the other cover media so that other person will not notice the presence of the information. This is a major distinction between this method and the other methods of covert exchange of information because, for example, in cryptography, the individuals notice the information by seeing the coded information but they will not be able to compr...

متن کامل

Symmetric Key Generation Method using Digital Image

In this paper, the authors propose a new key generation algorithm based on using a binary image. The proposed algorithm converts 16×16 binary array representing the digital image into 4×4 array, then it converts the new generated array into 4×4 decimal array. The decimal array and the left diagonal of the original array are then used to generate the public key that is used to encrypt the data t...

متن کامل

Public-key Steganography with Authentication Public-key Steganography with Authentication

Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...

متن کامل

Offensive Algorithm for Hiding and Extracting Information Using Image Steganography

In this paper we will study the various image based steganographic techniques for information hiding, analyze the problem in them and will propose a novel steganographic algorithm namely ‘An offensive algorithm for hiding and extracting information using Image Steganography’ for hiding information within the spatial domain of 24-bit color image and as well as extracting it. The motivation for t...

متن کامل

Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm

Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to decrypt it. It is the process of embedding secret data in the cover image without significant changes to the cover image. A cryptography algorithm is used to convert the secret messages to an unreadable form before emb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sinkron : jurnal dan penelitian teknik informatika

سال: 2023

ISSN: ['2541-2019', '2541-044X']

DOI: https://doi.org/10.33395/sinkron.v8i2.12266