Design of Application to Detect Images Embedded with Malicious Programs

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

In today’s world, malware can be propagated to victim systems in an increasingly diverse number of ways. One of these methods involves the passive distribution of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is to design an application that partially acts as a steganalysis tool to scan, detect and notify the user of the presence of a payload in either one or a set of selected images.it will then proceed to analyze the payload and verify whether it is a malicious program or not. It will also give a brief summarized file analysis of the detected payload. Ultimately, this will help highlight the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.

Authors and Affiliations

Keywords

Related Articles

A Classifier System for Unwanted Message Filtering From O.S.N User Space

As the use of On-line Social Networks (OSNs) rapidly increases, today there is need to provide users with the facility of controlling the messages posted on their private wall to avoid some unwanted content to be display...

Intrusion Detection in Wireless Network Using Fuzzy Rules

Computer Networks now a days are becoming a basic needs of this era where information sharing is key element for growth. With such use, the level of mischievousness has also grown briskly. Intrusion Detection Systems (ID...

An Overview of Data Mining Techniques and Applications

An Overview of Data Mining Techniques and Applications

Annotation Effective Cad Using Content and Information Extraction

"A large number of enterprises organizations currently generate and share literary descriptions of their own products and services. Such collections of data contain important structured information, which remains more un...

A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding

There is an increasing need for information sharing via on-demand access in different organizations. Information Brokering Systems (IBSs) have been introduced to connect large-scale lightly-associated data sources. This...

Download PDF file
  • EP ID EP357536
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

(2015). Design of Application to Detect Images Embedded with Malicious Programs. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357536