Font Size: a A A

Information Hiding Algorithm Based On The Executable File

Posted on:2015-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2268330428958887Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of the Internet, it is beginning to be used to convey importantinformation in personal, business, government, military and so on. But so many importantdata on public networks moves, once intercepted by malicious person, it may bring greatlosses to the users. For the government and the military, if it is intercepted, the developmentand stability of the whole country will pose a threat. Obviously information security is apressing issue. Information hiding, an important branch of information security technology,has been developing rapidly in recent years.Most steganographic algorithms are based on digital multimedia, including pictures,video, sound, text, etc. But steganographic algorithms using "executable file" as a carrier arenot many. Based on the analysis on the relevant algorithms, this paper proposes a newexecutable file steganography model. The model has an improvement in embedding rate andembedding capacity, in terms of security is also a breakthrough. The main contents are asfollows:1. It proposes a new information hiding model based on executable file. In order toembed secrets in executable files, the model builds redundant space in it through modifing thesource code and adding redundant functions with special structure.This model is characterizedby an increase of the executable file redundancy in the fundamental. In the process ofembedding information, it does not destroy the structure of the document, the information isdistributed evenly in the file and more in line with the code distribution. Experiments showthat the model is feasible and effective, with high embedding capacity and security;2. According to the executable characteristics of the executable file, this model isfurther divided to external extraction and self-extracting. External extraction algorithm similarto the traditional steganography, has a high safety and the embedding process is relativelysimple, the executable file is only seen as a carrier. The self-extracting steganographic algorithm uses execution characteristics of executable file to automatically extract hiddeninformation, the receiver don’t need to know the extraction algorithm, simplifies the processof extracting information, avoids the necessity of passing extraction algorithm on the network,hides the extraction details and makes the extraction algorithm has the flexibility andautonomy. Depending on security needs, it can take different embedding and extractionalgorithms, and don’t worry about the extraction problem of the receiver;3. In order to improve the embedding rate and security, a multi-carrier steganographytheory is introduced. Multiple carriers can make the distribution of secret information moredispersed with respect to a single carrier, information intercepted becomes more complex,each carrier can be embedded in an appropriate amount based on its own characteristics, andimprove the efficiency and safety in a whole.
Keywords/Search Tags:steganography, executable file, computer language, source code modified, embedding efficiency, security
PDF Full Text Request
Related items