Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Trojan implantation method based on information hiding
ZHANG Ru, HUANG Fuhong, LIU Jianyi, ZHU Feng
Journal of Computer Applications    2018, 38 (8): 2267-2273.   DOI: 10.11772/j.issn.1001-9081.2018020558
Abstract725)      PDF (1188KB)(503)       Save
Since a large number of Trojans are easily tracable on the Internet, a new Trojan attack scheme based on multimedia document was proposed. Firstly, the Trojan program was embedded into a carrier image as secret data by steganography. After the Trojan program was successfully injected, the encrypted user information was also hidden into the carrier image by steganography. Then the host automatically uploaded pictures to a social network. Finally, the attacker downloaded images from the social network and extracted secret data from images. The theoretical analysis and simulation results show that the proposed JPEG image steganography algorithm has good performance, and the Trojan scheme based on it outperfoms some existing algorithms in concealment, anti-forensics, anti-tracking and penetrating auditing. Such Trojans in social networks can cause user privacy leaks, so some precautions are given at last.
Reference | Related Articles | Metrics