Vulnerability Exploitations Using Steganography in PDF Files
نویسندگان
چکیده
منابع مشابه
Using Steganography to hide messages inside PDF files
Steganography focuses on hiding information in such a way that the message is undetectable for outsiders and only appears to the sender and intended recipient. Portable Document Format (PDF) steganography has not received as much attention as other techniques like image steganography because of the lower capacity and text-based file format, which make it harder to hide data. However some approa...
متن کاملA Survey on Steganography Using Multimedia Files
Steganography is a type of secrete communication that hides the secrete information. It deals with the different ways of hiding/embedding the secrete information such as text, image, audio or video files inside another multimedia files with the help of private key. The hidden information is termed as secrete file and the file in which the secrete file is hidden is termed as cover file. The file...
متن کاملCreating Structured PDF Files
This paper describes a tool for recombining the logical structure from an XML document with the typeset appearance of the corresponding PDF document. The tool uses the XML representation as a template for the insertion of the logical structure into the existing PDF document, thereby creating a Structured/Tagged PDF. The addition of logical structure adds value to the PDF in three ways: the acce...
متن کاملAutomatic Detection of Malicious PDF Files Using Dynamic Analysis
Malicious non-executable files are being increasingly used to break into users’ computers. Anti-virus solutions fail to detect all the malicious files. We propose using machine learning to process the reports generated by a dynamic analysis system. We implement a preliminary model, and despite its simplicity, we achieved a 97.45% prediction accuracy. The model can be further improved to reach a...
متن کاملmPDF: Framework for Watermarking PDF Files using Image Watermarking Algorithms
The advancement in digital technologies have made it possible to produce perfect copies of digital content. In this environment, malicious users reproduce the digital content and share it without compensation to the content owner. Content owners are concerned about the potential loss of revenue and reputation from piracy, especially when the content is available over the Internet. Digital water...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Networks and Applications
سال: 2020
ISSN: 2395-0455
DOI: 10.22247/ijcna/2020/193270