Code fusion information-hiding algorithm based on PE file function migration

نویسندگان

چکیده

Abstract PE (portable executable) file has the characteristics of diversity, uncertainty size, complexity structure, and singleness format, which make it easy to be a carrier information hiding, especially for that large hiding capacity. This paper proposes an information-hiding algorithm based on function migration, utilizes disassembly engine disassemble code section file, processes recognition, shifts whole codes system or user-defined functions last file. Then hides in original space. The hidden is combined with main coupled key program, further enhances concealment performance anti-attack capability system.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Text Information Hiding Algorithm Based on Alternatives

In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...

متن کامل

A Text Information Hiding Algorithm Based on Alternatives

In this paper, we analyze existing text-based steganography techniques, and propose an efficient information hiding algorithm for text based on substituted conception. In this algorithm, candidate units are replaced by similar conception, including synonym, homonym or special character. An improved encoding algorithm is also proposed which is not only enhances the robustness, but also enlarges ...

متن کامل

A Software Watermarking based on PE File with Tamper-proof Function

After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged re...

متن کامل

An Improved Information Hiding Algorithm

Hiding technology is a newly developed discipline that concludes many subjects and covers many fields, and it hides the transferring information in the carrier, which greatly increases the safety of information transmission. In order to hide and transfer information more effectively, the paper researched the cloud algorithm in the model of information hiding. It also studied the model of inform...

متن کامل

PE Expansion-Based Reversible Data Hiding without Location Maps

This paper proposes a prediction error expansionbased reversible data hiding method using no location map. Though a reversible data hiding method once distorts an image to hide data into the image, the distorted image is completely separated to the original image and the hidden data. The proposed method uses only one parameter to extract data; this method extracts data without any location map,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Eurasip Journal on Image and Video Processing

سال: 2021

ISSN: ['1687-5176', '1687-5281']

DOI: https://doi.org/10.1186/s13640-020-00541-3