%0 Journal Article %T Executable file backdoor steganographic algorithm with highly efficient
高效可执行文件后门隐写算法 %A ZHANG Meng %A CHEN Gou-xi %A ZHANG Peng-cheng %A
张 萌 %A 陈够喜 %A 张鹏程 %J 计算机应用研究 %D 2013 %I %X This paper proposed a modified steganographic algorithm based on program source file through analyzing the insufficient of the current steganographic algorithms based on the executable file. It embedded meaningless redundant functions and the backdoor code into the program source files evenly, then generated executable cover file after compiling. The redundant function was replaced by secret set to achieve the purpose of embedding information. It proves that the algorithm is feasible and effective through implementing it. There has a marked improvement in the rate of embedded than other algorithms, and can resistant to be detected by anti-virus software. The experiment results show that the algorithm has a higher embedding rate, larger capacity of embedding and strong security. There was an analysis of factors influencing the safety of this algorithm and proposed some feasibility schemes to improve it in the end. %K steganography %K source file %K executable file %K backdoor %K security
隐写 %K 源文件 %K 可执行文件 %K 后门 %K 安全性 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=DD8ECC43358E540DFB421B5A2B6970B4&yid=FF7AA908D58E97FA&vid=340AC2BF8E7AB4FD&iid=E158A972A605785F&sid=9978E8308B7F7CE6&eid=A0F0DDA3F8BC378D&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=0&reference_num=8