Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techniques to exploit these redundancies. A general framework to evaluate the stealth of the proposed techniques is introduced and applied on an implementation for the IA-32 architecture. This evaluation proves that, whereas existing tools such as Hydan [1] are insecure, significant encoding rates can in fact be achieved at a high security level
Steganography is the technique that hides secret messages in seemingly inoccuous data. Steganalysis ...
Abstract. Hydan is a steganographic tool which can be used to hide any kind of information inside ex...
Steganography is a method of hiding secret message in other innocuous looking object so that its pre...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cov...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
This paper explores the potential of executables for covert communication. Three techniques for the ...
We present a scheme to steganographically embed information in x86 program binaries. We define sets ...
Abstract.. Steganography is defined as covered writing and it has been used to achieve confidentiali...
Previously traditional methods were sufficient to protect the information, since it is simplicity in...
This bachelor's thesis concerns itself with steganographic concealment of arbitrary data in executab...
I present a set of methods that can be used to hide data within a portable executable, and another m...
Digital steganography refers to the insertion of a secret message into a carrier file to covertly ...
There have been a number of steganography embedding techniques proposed over the past few years. In ...
Steganography is still in its infancy as in comparison to cryptography in terms of research and deve...
Steganography is an art that involves the concealing of information with the aim of making the commu...
Steganography is the technique that hides secret messages in seemingly inoccuous data. Steganalysis ...
Abstract. Hydan is a steganographic tool which can be used to hide any kind of information inside ex...
Steganography is a method of hiding secret message in other innocuous looking object so that its pre...
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cov...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
This paper explores the potential of executables for covert communication. Three techniques for the ...
We present a scheme to steganographically embed information in x86 program binaries. We define sets ...
Abstract.. Steganography is defined as covered writing and it has been used to achieve confidentiali...
Previously traditional methods were sufficient to protect the information, since it is simplicity in...
This bachelor's thesis concerns itself with steganographic concealment of arbitrary data in executab...
I present a set of methods that can be used to hide data within a portable executable, and another m...
Digital steganography refers to the insertion of a secret message into a carrier file to covertly ...
There have been a number of steganography embedding techniques proposed over the past few years. In ...
Steganography is still in its infancy as in comparison to cryptography in terms of research and deve...
Steganography is an art that involves the concealing of information with the aim of making the commu...
Steganography is the technique that hides secret messages in seemingly inoccuous data. Steganalysis ...
Abstract. Hydan is a steganographic tool which can be used to hide any kind of information inside ex...
Steganography is a method of hiding secret message in other innocuous looking object so that its pre...