Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Hide files within files for better data security
by Staff Writers
Washington DC (SPX) May 11, 2011


File image.

Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action.

At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art.

Those intent on hiding information from prying eyes can embed data in the many different file types that are ostensibly music files (mp3), images (jpeg), video (mpeg4) or word-processing documents.

Unfortunately, there is a limit to how much hidden data can be embedded in such files without it becoming apparent that something is hidden because the file size increases beyond what one might expect to see for a common music or video file, for instance. A five minute music file in mp3 format and the widespread sampling rate of 128 kilobits per second, for instance, is expected to be about 5 megabytes in size.

Much bigger and suspicions would be aroused as to the true nature of the file, examination with widely available mp3-tagging software would reveal something amiss with the file's contents. The same could be said for almost all other file types.

However, one group of files that vary enormously in size and are usually rather difficult to examine in detail because they comprise of compiled computer code are executable, or exe, files. These files tend to contain lots of what might be described as "junk data" of their own as well as internal programmer notes and identifiers, redundant sections of code and infuriatingly in some senses coding "bloat".

All of this adds up to large and essentially random file sizes for exe files. As such, it might be possible to embed and hide large amounts of data in encoded form in an exe file without disrupting the file's ability to be executed, or run, as a program but crucially without anyone discovering that the exe file has a dual function.

Computer scientists Rajesh Kumar Tiwari of the GLNA Institute of Technology, in Mathura and G. Sahoo of the Birla Institute of Technology, in Mesra, Ranchi, India, have developed just such an algorithm for embedding hidden data in an executable file.

They provide details in the International Journal of Internet Technology and Secured Transactions. The algorithm has been built into a program with graphical user interface that would take a conventional exe file and the data to be hidden as input and merge the two producing a viable exe file with a hidden payload.

The technology could be used on smart phones, tablet PCs, portable media players and any other information device on which a user might wish to hide data.

"A novel steganographic methodology for high capacity data hiding in executable files" in Int. J. Internet Technology and Secured Transactions, 2011, 3, 210-222

.


Related Links
-
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
LockMart and Carnegie Mellon University Pursue Cyber Security Innovation with New Lab
Pittsburgh PA (SPX) May 10, 2011
The number one federal government IT provider and one of the nation's leading research universities are teaming up to tackle the rapidly-changing world of cyber security. Lockheed Martin has opened a new cyber lab space near the campus of Carnegie Mellon University, where the organizations will conduct joint research and development into concepts and technologies that could shape the future of c ... read more


CYBER WARS
Space Adventures proposes modified Soyuz TMA for Lunar tourists

BRP To Contribute To Canadian Moon And Mars Exploration Programs

Naveen Jain Co-Founder And Chairman Of Moon Express

Project Morpheus To Begin Testing At NASA's Johnson Space Center

CYBER WARS
Mars Express Sees Deep Fractures on Mars

Opportunity Images Small Craters

Exploring Rio Tinto Eurobotically

NASA Orbiter Reveals Big Changes in Mars' Atmosphere

CYBER WARS
AFIT education paves way to space

Soyuz launch from Europe space base set for October

NASA, Space Community Remember 'Freedom 7'

NASA Selects 'Whipple' Mission for Technology Development

CYBER WARS
Top Chinese scientists honored with naming of minor planets

China sees smooth preparation for launch of unmanned module

China to attempt first space rendezvous

Countdown begins for Chineses space station program

CYBER WARS
ISS orbit to be readjusted for Soyuz TMA-20 return

Soyuz is in the launch zone at Europe's Spaceport

Progress Docks To ISS

Russia ferries supplies to space

CYBER WARS
ST-2's installation on SYLDA marks the start of final payload integration for Ariane 5's next mission

Arianespace to launch ABS-2 in 2013

GSAT-8 put through its paces

Ariane Ariane 5 enjoys second successful launch for 2011

CYBER WARS
What a scorcher: 'Hot Jupiter' puzzle explained

An Earth as Dense as Lead

Astronomers unveil portrait of 'super-exotic super-Earth'

Tuning Into ExoPlanet Radio

CYBER WARS
Google notebooks challenge Microsoft

Broadband Lidar Instrument Successfully Tested on NASA's DC-8

Russia says fire put out near radioactive facility

Northrop Grumman Scalable SIRU Guides MESSENGER Spacecraft to Orbit Mercury




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement