Font Size: a A A

The Research Of Information Hiding Technology Based On Portable Executable File Format

Posted on:2006-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:L P ShaoFull Text:PDF
GTID:2168360152989924Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the development of computer software, hardware, network technologies and the applications of internet, information technologies which contributes to the development of everything has been put into applications in all kinds of work.  But at the same time, there exist some loopholes and security  problems and stand the possibilities of information being illegal intercepted, modified and ravaged. The computer viru and damage of net hacker is also a serious problem. All of these problems are becoming the menaces of informations, with an effect to influence national security, economic development, and personal profit.  Although cryptology has already developed and played an important role in information security, cryptology is coming to plunge into difficult situations that have to keep development by improving the length of key and various algorithms. Moreover, the cryptology can not solve all the problems of information security. The overseas or domestic experts and scholars find a way to solve the problems and protect the informations by the technology of information hiding. Now, information hiding technology is developing, the main research results is only limited to digital watermarks, there still exist some problems that had not been solved. The research work of this article is developed under this background, which try to solve the problems by  using portable executable file format file as the  embedded information carrier, embedding the information to PE file. Methods of embedding information are developed in this article, which make use of the redundant spaces, redundant structures and the static spaces allocated to strings. The methods of protecting the hiding informations are introduced in this article. One takes advantages of the information disguising technology, which got different explain results by the way of different interprets to prevent the carried information from being correctly understood or modified. The other is availed of the methods of secret sharing, which relocated the original embedded informations into some carriers.  When  some embedded informations are damaged, others can be used to recover the original embedded information to keep the embedded data completely. The two secret sharing schemas are deduced in this article, which using the characters of logic functions of Boolean algebra. How to relocate the embedded data in the two secret sharing schemas are also introduced.
Keywords/Search Tags:portable executable file format, information hiding, information disguising, secret sharing, boolean algebra
PDF Full Text Request
Related items