首页> 外文期刊>Journal of computer sciences >Challenges of Hidden Data in the Unused Area Two within Executable Files
【24h】

Challenges of Hidden Data in the Unused Area Two within Executable Files

机译:可执行文件中未使用区域2中隐藏数据的挑战

获取原文
获取原文并翻译 | 示例

摘要

Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file (exe.file). Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process.
机译:问题陈述:可执行文件是操作系统和开发人员(程序员/软件工程师)设计的大多数系统中最重要的文件之一,然后将信息隐藏在这些文件中是此研究的基本目标,因为大多数用户系统无法更改或修改这些文件的内容。可执行文件中两个未使用区域中的隐藏数据存在许多挑战,这是封面文件大小与隐藏信息大小的相关性,隐藏过程前后文件大小的差异,封面的可用性隐藏文件后,隐藏文件才能正常执行,并且由于对文件所做的更改而被防病毒软件检测到。方法:该系统旨在容纳由两个功能组成的释放机制;首先是通过执行四个过程(指定封面文件,指定信息文件,对信息进行加密并隐藏信息),将信息隐藏在PE文件(exe.file)的未使用区域2中;以及第二个功能是通过三个过程来提取隐藏信息(指定Steno文件,提取信息并解密信息)。结果:这些程序用Java计算机语言编码,并在Pentium PC上实现。设计的算法旨在帮助建议的系统以隐藏和撤回任何执行文件(exe.file)的未使用区域2中的信息(数据文件)为目标。结论:模拟了短期响应的特征,即隐藏数据的大小确实取决于封面文件中未使用区域2的大小,该大小等于隐藏过程之前exe.file大小的20%,大多数防病毒系统都会这样做不允许直接在可执行文件中进行写操作,因此建议的系统的方法是防止隐藏信息被这些系统观察到,并且exe.file在隐藏过程之后仍然照常运行。

著录项

  • 来源
    《Journal of computer sciences》 |2009年第11期|p.890-897|共8页
  • 作者单位

    Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, 53100 Gombak, Kuala Lumpur, Malaysia;

    Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, 53100 Gombak, Kuala Lumpur, Malaysia;

    Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, 53100 Gombak, Kuala Lumpur, Malaysia;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    cryptography Vs steganography; hidden data within executable file;

    机译:密码术与隐写术;可执行文件中的隐藏数据;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号