We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection process to encode information in machine code by using the appropriate instructions from each set. Such a scheme can be used to watermark (or fingerprint) code, sign executables, or simply create a covert communication channel. We experimentally measure the capacity of the covert channel by determining the distribution of equivalent instructions in several popular operating system distributions. Our analysis shows that we can embed only a limited amount of information in each executable (approximately 1110 bit encoding rate), although this amount is sufficient for some o...
The strength of the information hiding science is due to the non-existence of standard algorithms to...
The rapid growth of covert activities via communications network brought about an increasing need to...
Steganography, the idea of hiding messages and data within other pieces of data, can be useful in ma...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cov...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cove...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
Hydan is a steganographic tool which can be used to hide any kind of information inside executable f...
Steganography is an art that involves the concealing of information with the aim of making the commu...
In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present s...
Steganography is the art of hiding information in ways that prevent its detection. Though steganogra...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
The rapid growth of multimedia transmission leads to lose the owner identity of their products. The...
In this paper we present a new technique to enhance embedding capacity of a steganographic channel b...
There have been a number of steganography embedding techniques proposed over the past few years. In ...
The idea of balancing the side-channel leakage in software was proposed more than a decade ago. Just...
The strength of the information hiding science is due to the non-existence of standard algorithms to...
The rapid growth of covert activities via communications network brought about an increasing need to...
Steganography, the idea of hiding messages and data within other pieces of data, can be useful in ma...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cov...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cove...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
Hydan is a steganographic tool which can be used to hide any kind of information inside executable f...
Steganography is an art that involves the concealing of information with the aim of making the commu...
In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present s...
Steganography is the art of hiding information in ways that prevent its detection. Though steganogra...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
The rapid growth of multimedia transmission leads to lose the owner identity of their products. The...
In this paper we present a new technique to enhance embedding capacity of a steganographic channel b...
There have been a number of steganography embedding techniques proposed over the past few years. In ...
The idea of balancing the side-channel leakage in software was proposed more than a decade ago. Just...
The strength of the information hiding science is due to the non-existence of standard algorithms to...
The rapid growth of covert activities via communications network brought about an increasing need to...
Steganography, the idea of hiding messages and data within other pieces of data, can be useful in ma...