IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Hiding for Text and Binary Files

Data Hiding for Text and Binary Files
View Sample PDF
Author(s): Hioki Hirohisa (Kyoto University, Japan)
Copyright: 2014
Pages: 20
Source title: Computational Linguistics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-6042-7.ch074

Purchase

View Data Hiding for Text and Binary Files on the publisher's website for pricing and purchasing information.

Abstract

This chapter presents an overview of text-based and binary-based data hiding methods. Text methods, through which secret information is embedded into innocent-looking textual data, are mostly used for steganography. Binary methods are applied to program binary codes: executables and libraries. In binary methods, information is embedded into a binary code so that its functionality is preserved. Data hiding methods for binary codes have been studied intensively to perform watermarking for protecting software from piracy acts. A message can also be embedded into a binary code in a steganographic manner. Another method is also introduced, which is proposed for enhancing the performance of an executable file.

Related Content

Reinaldo Padilha França, Ana Carolina Borges Monteiro, Rangel Arthur, Yuzo Iano. © 2021. 21 pages.
Abdul Kader Saiod, Darelle van Greunen. © 2021. 28 pages.
Aswini R., Padmapriya N.. © 2021. 22 pages.
Zubeida Khan, C. Maria Keet. © 2021. 21 pages.
Neha Gupta, Rashmi Agrawal. © 2021. 20 pages.
Kamalendu Pal. © 2021. 14 pages.
Joy Nkechinyere Olawuyi, Bernard Ijesunor Akhigbe, Babajide Samuel Afolabi, Attoh Okine. © 2021. 19 pages.
Body Bottom