Stegware Destruction Using Showering Methods
Saurabh Choudhury1, Amritha P.P2, M. Sethumadhavan3

1Saurabh Choudhury, Technology Information Forecasting and Assessment Council, Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.

2Amritha P. P, Technology Information Forecasting and Assessment Council, Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.

3M. Sethumadhavan, Technology Information Forecasting and Assessment Council, Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.

Manuscript received on 05 April 2019 | Revised Manuscript received on 14 April 2019 | Manuscript Published on 24 May 2019 | PP: 256-259 | Volume-8 Issue-6S3 April 2019 | Retrieval Number: F10520486S319/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Stegware is a steganographic technique used to hide malware in images. Once the malware embedded image is loaded on the victim side, an attacker can execute these malwares remotely and potentially steal information from the end user. Because of its nature, Stegware cannot be detected by usual methods, but it can be destroyed before it executes. In this paper we introduce showering mechanism which will destroy the malware and only innocent or cleaned image will be received by the end user. Experimental results show that Stegware is even vulnerable to histogram attack. This destruction method can completely block the execution of Stegware and preserves the quality of image which is measured using PSNR.

Keywords: Stegware, Malware, Steganography.
Scope of the Article: Security Technology and Information Assurance