A novel steganographic methodology for high capacity data hiding in executable files

The prevalence of multimedia data in our digital world exposes a new opportunity for communication using steganographic mediums and new steganographic cover mediums for data hiding are constantly being proposed from classical image file, mp3, mp4, text, html and executable files. Most of the previous works on executable file were consequently done at the source code or compilation level and stores only a small amount of secret data. In this work, we present and analyse a novel methodology that illustrates how we can store a large amount of secret data in executable files. For implementing our proposed methodologies we use Microsoft platform for the illustration purpose only.

[1]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[2]  Mike Van Emmerik,et al.  Using a decompiler for real-world source recovery , 2004, 11th Working Conference on Reverse Engineering.

[3]  Gadadhar Sahoo,et al.  Some New Methodologies for Image Hiding using Steganographic Techniques , 2012, ArXiv.

[4]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[5]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[6]  Christian S. Collberg,et al.  On the Limits of Software Watermarking , 1998 .

[7]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[8]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[9]  Gadadhar Sahoo,et al.  Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization , 2008 .

[10]  Angelos D. Keromytis,et al.  Hydan: Hiding Information in Program Binaries , 2004, ICICS.

[11]  Jean-Jacques Quisquater,et al.  Robust Object Watermarking: Application to Code , 1999, Information Hiding.

[12]  Lisa M. Marvel,et al.  Hiding information in images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).