Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/336291
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2021-08-16T10:14:07Z-
dc.date.available2021-08-16T10:14:07Z-
dc.identifier.urihttp://hdl.handle.net/10603/336291-
dc.description.abstractIn this thesis, social networking sites have been analyzed which are used to share information through images for identifying the different types of threats associated with them. Numerous algorithms have been explored related to JPEG steganography and JPEG steganalysis techniques to understand the JPEG markers, their types and working with the detection accuracy. Real attacks which are occurred through malicious jpeg attacks are analyzed for malicious codes or scripts inside the images, which are intentionally embedded by the attackers. In this research work, a novel framework is proposed and implemented to detect the malicious code/script/URL present inside the JPEG image. A complete secured virtual malware analysis lab was developed in which the working of real malicious samples are explored and noted. For this research 300 malicious JPEG image samples are collected from five different antivirus companies repositories. Through this research the output comes as a complete way to analyze any JPEG image for detection and extenuate a malware which spread through images over online social networking sites.
dc.format.extentxv, 111
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleAnalysis designing and evaluating technique to extenuate malware spread through images over online social networking sites
dc.title.alternative
dc.creator.researcherKunwar, Rakesh Singh
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Cybernetics
dc.subject.keywordCyber Security
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideSharma, Priyanka
dc.publisher.placeAhmedabad
dc.publisher.universityRaksha Shakti University
dc.publisher.institutionSchool of Information Technology, Artificial Intelligence and Cyber Security (SITAICS)
dc.date.registered2015
dc.date.completed2019
dc.date.awarded2019
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Information Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File441.48 kBAdobe PDFView/Open
02_declaration.pdf376.59 kBAdobe PDFView/Open
03_ certificate.pdf399.19 kBAdobe PDFView/Open
04_copyright.pdf278.73 kBAdobe PDFView/Open
05_acknowledgement.pdf287.29 kBAdobe PDFView/Open
06_table of contents.pdf392.99 kBAdobe PDFView/Open
07_list of figures.pdf294.3 kBAdobe PDFView/Open
08_list of tables.pdf290.87 kBAdobe PDFView/Open
09_abstract.pdf387.86 kBAdobe PDFView/Open
10_chapter 1.pdf825.35 kBAdobe PDFView/Open
11_chapter 2.pdf1.08 MBAdobe PDFView/Open
12_chapter 3.pdf322.38 kBAdobe PDFView/Open
13_chapter 4.pdf664.1 kBAdobe PDFView/Open
14_chapter 5.pdf1.54 MBAdobe PDFView/Open
16_references.pdf531.21 kBAdobe PDFView/Open
17_appendix.pdf623.8 kBAdobe PDFView/Open
80_recommendation.pdf739.71 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: