Vulnerability exploitations using steganography in PDF files

This article analyses the ways malicious executable files hides with Steganography on the most used files of our daily basis such as PDF, Word, Text, and Image. It demonstrates how data is hidden and gathers innovative ways of identifying potential attacks to prevent them by engaging the safety and...

Full description

Bibliographic Details
Main Authors: Araujo, Istteffanny Isloure, Kazemian, Hassan
Format: Article
Language:English
Published: EverScience Publications 2020
Subjects:
Online Access:https://repository.londonmet.ac.uk/5717/1/IJCNA-2020-O-02.pdf