• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2015, Volume: 8, Issue: 26, Pages: 1-9

Original Article

A Study on a Method Protecting a Secure Network against a Hidden Malicious Code in the Image

Abstract

On the Web, internet sources not only read and view but also are saved in the computer. In addition, we conveniently download the image file which doesn’t know whether it contains a malicious code or not. Moreover, the Internet Image files are the passages which are easy enough to flow in a closed network, but a malicious code, which is secretly inserted into a picture file, can be performed as a malicious offensive code, that is, a hacking code with triggers such as HTML files or executable JavaScript code. So, we suggest an algorithm for safe use with a blocking method of the image file which doesn’t know whether to contain a malicious performance code in a closed network or not.
Keywords: Closed Network, Image Hacking, Malicious Code, Steganography, Stegosploit

DON'T MISS OUT!

Subscribe now for latest articles and news.