Design of Application to Detect Images Embedded with Malicious Programs

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

In today’s world, malware can be propagated to victim systems in an increasingly diverse number of ways. One of these methods involves the passive distribution of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is to design an application that partially acts as a steganalysis tool to scan, detect and notify the user of the presence of a payload in either one or a set of selected images.it will then proceed to analyze the payload and verify whether it is a malicious program or not. It will also give a brief summarized file analysis of the detected payload. Ultimately, this will help highlight the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.

Authors and Affiliations

Keywords

Related Articles

A Case Report of Posner Schlossman Syndrome

A 43 year old male presented to the emergency room of Assam Medical College & Hospital, Dibrugarh, with the chief complains of vision of right eye with redness, fogginess of vision, pain and vomiting.  There was corneal...

Performance Evaluation of Power Saving Routing Protocol

There is tremendous increase in the applications which uses internet which results into affecting the network performance(QoS) because of heavy traffic load on the core routers which causes into more power requirements i...

Infringement Of IPR in Race of Information Technology

Information Technology is growing faster than any other communication vehicle in the history of mankind. Invention of digital technology was the most important revolution in the last century. The influence of digital tec...

The Analysis of Effect of Economic Value Added (EVA) and Market Value Added (MVA) on Share Price of Subsector Companies of Property Incorporated in LQ45 Indonesia Stock Exchange in Period of 2009-2013

"After the global crisis in 2008, the Indonesian economy grew higher with maintained stability. These numbers eventually push up asset prices, including property. The increase in property prices in turn increases the dem...

EDCD Method for Discovering Connectivity Disruption in WSN

Wireless Sensor Networks (WSNs) frequently part from interrupt connectivity caused by its several aspects such as restricted battery power of a node and unattended operation helpless to aggressive damage. The interruptio...

Download PDF file
  • EP ID EP357536
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

(2015). Design of Application to Detect Images Embedded with Malicious Programs. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357536