期刊文献+

基于逆向工程的信息隐藏软件研究 被引量:2

Reverse engineering-based steganographic software
下载PDF
导出
摘要 采用软件逆向工程的方法,借助静态和动态软件逆向分析工具IDA Pro和SoftICE,研究了某款商用信息隐藏软件,逆推出该软件系统总体执行过程,在此基础上分析出其核心信息隐藏算法以及数据加解密算法,为解决商用信息隐藏软件的检测问题提出一种新的思路.采用本方法能够检测一幅图片中是否存在由该信息隐藏软件隐藏了信息,并且无论加密与否都能够正确提取出来. With the help of public available static and dynamic software reverse analysis tools such as IDA Pro and SoftlCE, one commercial information hiding software without source code was analyzed by applying the method of software reverse engineering, inferred entire execution procedure of this software system, cracked the core information hiding algorithms and data encrypt algorithms and then proposed a new method for the detection of commercial information hiding software. Using the method stated in this paper, we can detect a picture to make a decision if there is information hidden though this kind of information hiding software in it and pick out the information correctly, whether it is en crypted or not.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第9期125-128,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 信息隐藏 最低有效位算法 软件逆向工程 information hiding least significant bits algorithm software reverse engineering
  • 相关文献

参考文献7

二级参考文献19

  • 1H Inoue et al.A Digital Watermark Based on the Wavelet Transform and its Robustness on Image Compression[C].In:Proc IEEE In ternational Conf on Image Processing,ICIP-98,1998;2:391-395.
  • 2R G Van Schyndel et al.A Digital Watermark[C].In:Proc IEEE Infl Conf on Image Processing,ICIP,1994;2:86-90.
  • 3F A P Petitcolas et al.Information Hiding-A Survey[C].In:Proceedings of the IEEE.1999:87(7):1062-1078.
  • 4C Cachin.An Information-Theoritic Model for Steganography[C].In: Proc of the 2nd International Workshop on Information Hiding,Portland,Oregon,USA,Lecture notes in CS,Springer-Verlag,1998.
  • 5Scott Craver,Nasir Memon,Boon-Lock Yeo.Resolving rightful ownerships with invisible watermarking techniques : limitations, attack, and implications[J].IEEE journal on selected areas in communication, 1998 : 16 (4) :573-586.
  • 6Craver et al.Technical Trials and Legal Tribulafions[J].Communications of the ACM, 1998;41(7) :45-54.
  • 7S Craver et al.Resolving Rightful Ownerships with Invisible Water marking Techniques :Limitations,Attacks and Implications[J].IEEE Jou on Selected Areas in Communications, 1998 ; 16(4) :573-586.
  • 8I J Cox,M Miller.A Review of Watermarking and Importance of Perceptual Modelling[C].In:Proc SPIE Human Vision and lmaging,SPIE- 3016,1997.
  • 9M Barni et al.A DCT-Domain System for Robust Image Watermarking[J].Signal Processing, 1998 ;66(3) : 357-372.
  • 10B Tao,B Dickinson.Adaptive Watermarking in DCT Domain[C].In: Proc IEEE International Conf on Ac.c~oustics,Speeeh and Signal Proeessing, ICASSP-97,1997; 4: 2985-2988.

共引文献88

同被引文献23

  • 1贾培宏,马劲松,史照良,徐志中.GIS空间数据水印信息隐藏与加密技术方法研究[J].武汉大学学报(信息科学版),2004,29(8):747-751. 被引量:29
  • 2邹昕光,金海军,郝克成,孙圣和.基于HTTP协议多维随机参数插入通信隐藏算法[J].计算机工程与应用,2006,42(34):127-130. 被引量:6
  • 3Lie Wennung, Chang Lichun. Robust and high-quality time domain audio watermarking based on low-frequency amplitude modification[J]. IEEE Transactions on Multimedia, 2006, 8(1): 46-59.
  • 4Ehsan Tavakoli, Bijan Vosoughi Vahdat, et al. Audio watermarking for covert communication through telephone system[C]//IEEE Signal Processing Society and IEEE Computer. Vancouver: IEEE, 2006: 955- 959.
  • 5Godefroid P, Wolper P. A partial approach to model checking[M]. IEEE Symposium on Logic in Computer Science. Orlando: Academic Press, 1994.
  • 6Petitcolas F A P, et al. Information hiding-a survey [C]//Proceedings of the IEEE, 1999, 87(7) :1 062- 1 078.
  • 7van Schyndel R G. A digital watermark[C] // IEEE Infl Conf on Image Processing. [s. l. ]: ICIP, 1994, 2 : 86-90.
  • 8Yu P T, Tsai H H, Lin J S. Digital watermarking based on neural networks for color images[J]. Signal Processing, 2001, 81(5): 663-671.
  • 9王泽辉.三维随机矩阵置乱变换的周期及其应用[J].中山大学学报(自然科学版),2008,47(1):21-25. 被引量:4
  • 10由守杰,柏森,曹巍巍,李高峰.一种抗DA/AD转换的音频信息隐藏算法[J].计算机工程与应用,2008,44(7):113-116. 被引量:8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部