期刊文献+

基于代码搬移的PE文件信息隐藏 被引量:4

Information Hiding Scheme of PE File Format Based on Code Moving
原文传递
导出
摘要 根据PE文件代码段的结构特点,对代码段子程序进行了分析,提出了将子程序进行搬移,而将信息隐藏到原来子程序位置处的信息隐藏方案。该方案将信息隐藏在代码段代码之中,使隐藏信息和PE文件原有数据紧密结合。隐藏后信息分散在PE文件各个位置,具有很高的隐蔽性,不易被察觉。和已有的一些方案相比,该方案通过提高隐藏信息的分散性增强了信息的隐蔽性,通过对隐藏信息进行加密,增强了信息的安全性。 Based on the characteristic of subroutine in code section of PE file format, this paper proposes a new information hiding scheme, in which the subroutine is moved in code section and then the information is hidden in the location of original subroutine. This scheme hides the information in the code, and makes the hidden information closely combined with the original data of PE file. The hidden information is scattered in various locations of PE file, and thus is hard to be detected. As compared with other schemes, this scheme could enhance the dispersion and security of hidden information by encrypting and scattering the information.
出处 《通信技术》 2010年第8期184-186,共3页 Communications Technology
关键词 PE文件 信息隐藏 代码搬移 PE file format information hiding code moving
  • 相关文献

参考文献5

二级参考文献19

  • 1吴振强,冯绍东,马建峰.PE文件的信息隐藏方案与实现[J].计算机工程与应用,2005,41(27):148-150. 被引量:18
  • 2张维,山秀明,任勇.基于时空二维混沌的数字水印算法[J].微计算机信息,2005,21(11X):4-5. 被引量:8
  • 3徐晓静,徐向阳,梁海华,黄友荣.PE文件资源节的信息隐藏研究与方案实现[J].计算机应用,2007,27(3):621-623. 被引量:13
  • 4季梁.数字图像处理[M].北京:清华大学出版社,1998.
  • 5魏为民.基于彩色静止数字图像的信息隐藏技术研究.
  • 6Microsoft Corporation.Microsoft Portable Executable and Common Object File Format Specification[EB/OL].(2008-02-15).http:// www.microsoft.com/whdc/system/platform/firmware/pecoff.mspx.
  • 7Liu Hongmei,Zhang Zhefeng,Huang Jiwu.A High Capacity Distortion-free Data Hiding Algorithm for Palette Image[C]//Proc.of the 2003 International Symposium on Circuits and Systems.Bangkok,Thailand:IEEE Press,2003.
  • 8吕凤军.数字图像处理编程入门[M].北京:清华大学出版社,1999..
  • 9W Bender,D Gruhl,N Morimoto. Techniques for data hiding[R].Technical Report,MIT Media Lab,1994
  • 10Stefan Katzenbeisser,Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking[M].Artech House Publishers, 2000

共引文献22

同被引文献16

  • 1吴振强,冯绍东,马建峰.PE文件的信息隐藏方案与实现[J].计算机工程与应用,2005,41(27):148-150. 被引量:18
  • 2方旺盛,邵利平,张克俊.基于PE文件格式的信息隐藏技术研究[J].微计算机信息,2006,22(11X):77-80. 被引量:9
  • 3徐晓静,徐向阳,梁海华,黄友荣.PE文件资源节的信息隐藏研究与方案实现[J].计算机应用,2007,27(3):621-623. 被引量:13
  • 4段钢.加密与解密[M].第3版.北京:电子工业出版社,2009.
  • 5WANG Yulin,SHEN Yang,PAN Jian.Usage Control Based on Windows Kernel Hook[C].Jeju Island,South Korea:International Conference on Information and Multimedia Technology,2009:264-267.
  • 6MARHUSIN Mohd Fadzli,LARKIN Henry,LOKAN Chris,et al.An Evaluation of API Calls Hooking Performance[C].Suzhou,China:Computational Intelligence and Security,2008:315-319.
  • 7RABER Jason,KRUMBEUER Brian.Hyatt Regency Crystal City:.QuietRIATT:Rebuilding the Import Address Table Using Hooked DII Calls[R].[s.l.]:Riverside Research Institute,2009.
  • 8MOSER Andreas,KRUEGEL Christopher,KIRDA Engin.Exploring Multiple Execution Paths for Malware Analysis[C].Berkeley,California:IEEE Symposium on Security and Privacy,2007:231-245.
  • 9WILLEMS Carsten,HOLZ Thorsten,FREILING Felix.Toward Automated Dynamic Malware Analysis Using CWSsandbox[J].IEEE Security and Privacy,2007,05(02):32-39.
  • 10ZAIDAN A A, ZAIDAN B B, OTHMAN F. New technique of hidden data in PE-File with in unused area one [ J ]. International ,Journal of Computer and Electrical Engineering,2009,1 ( 5 ) :642650.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部