{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:49:46Z","timestamp":1740145786396,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373132"],"award-info":[{"award-number":["61373132"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding capacity. This paper proposes an information-hiding algorithm based on PE file function migration, which utilizes disassembly engine to disassemble code section of PE file, processes function recognition, and shifts the whole codes of system or user-defined functions to the last section of PE file. Then it hides information in the original code space. The hidden information is combined with the main functions of the PE file, and the hidden information is coupled with the key codes of the program, which further enhances the concealment performance and anti-attack capability of the system.<\/jats:p>","DOI":"10.1186\/s13640-020-00541-3","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T17:13:16Z","timestamp":1609953196000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Code fusion information-hiding algorithm based on PE file function migration"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9555-8079","authenticated-orcid":false,"given":"Zuwei","family":"Tian","sequence":"first","affiliation":[]},{"given":"Hengfu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"issue":"27","key":"541_CR1","first-page":"148","volume":"41","author":"Z Wu","year":"2005","unstructured":"Z. Wu, S. Feng, J. Ma, Information hiding scheme and implementation of PE file. Comput. Eng. Appl. 41(27), 148\u2013150 (2005)","journal-title":"Comput. Eng. Appl."},{"key":"541_CR2","series-title":"Proc of the 6th International Conference on Information and Communications Security","first-page":"287","volume-title":"Hiding information in program binaries","author":"R El-Khalil","year":"2004","unstructured":"R. El-Khalil, A.D. Keromytis, Hiding information in program binaries, Proc of the 6th International Conference on Information and Communications Security (Springer, Berlin, 2004), pp. 287\u2013291"},{"issue":"2","key":"541_CR3","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1504\/IJITST.2011.039779","volume":"3","author":"RK Tiwari","year":"2011","unstructured":"R.K. Tiwari, G. Sahoo, A novel steganographic methodology for high capacity data hiding in executable files. Int. J. Internet Technol. Secured Trans. 3(2), 210\u2013222 (2011)","journal-title":"Int. J. Internet Technol. Secured Trans."},{"key":"541_CR4","unstructured":"S.B. Che, S. Jin, G.W. Ling, in International Conference on Computer Science and Education (ICCSE10). Software watermark research based on portable execute file (Hefei, 2010), pp. 1367\u20131372"},{"key":"541_CR5","doi-asserted-by":"crossref","unstructured":"Z. Sha, H. Jiang, A. Xuan, in the 3rd International Conference on Genetic and Evolutionary Computing (WGEC09). Software watermarking algorithm by coefficients of equation (Guilin, 2009), pp. 410\u2013413","DOI":"10.1109\/WGEC.2009.18"},{"key":"541_CR6","unstructured":"X. Wang, Y. Wang, X. Zhang, et al., Research on PE file software watermark against similarity attack. Netw. Secur. Technol. Appl., 82\u201384 (2007)"},{"key":"541_CR7","unstructured":"A.A. Zaidan, B.B. Zaidan, A.W. Naji, et al., in International Conference on Advanced Management Science (ICAMS09). Approved undetectable-antivirus steganography for multimedia information in PE-file (Singapore, 2009), pp. 437\u2013441"},{"key":"541_CR8","first-page":"46","volume":"1","author":"H Alanazi","year":"2010","unstructured":"H. Alanazi, H.A. Jalab, A.A. Zaidan, et al., New framework of hidden data with in non multimedia file. Int. J. Comput. Netw. Secur. 1, 46\u201353 (2010)","journal-title":"Int. J. Comput. Netw. Secur."},{"key":"541_CR9","first-page":"890","volume":"1","author":"AW Naji","year":"2009","unstructured":"A.W. Naji, A.A. Zaidan, B.B. Zaidan, Challenges of hidden data in the unused area two within executable files. J. Comput. Sci. 1, 890\u2013896 (2009)","journal-title":"J. Comput. Sci."},{"key":"541_CR10","unstructured":"A.A. Zaidan, B.B. Zaidan, A.W. Naji, et al., in International Conference on Information management and engineering (ICIME09). Securing cover-file of hidden data using statistical technique and AES encryption algorithm (Malaysia, 2009), pp. 35\u201340"},{"issue":"2","key":"541_CR11","first-page":"1672","volume":"2","author":"A Haveliya","year":"2012","unstructured":"A. Haveliya, A new approach for secret concealing in executable file. Int. J. Eng. Res. Appl. 2(2), 1672\u20131674 (2012)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"541_CR12","unstructured":"B.B. Zaidan, A.A. Zaidan, F. Othman, et al., in Proceeding of the International Conference on Cryptography, Coding and Information Security. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography (Paris, 2009), pp. 1\u201322"},{"issue":"1","key":"541_CR13","first-page":"273","volume":"7","author":"MR Islam","year":"2009","unstructured":"M.R. Islam, A.W. Naji, A.A. Zaidan, et al., New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques. Int. J. Comput. Sci. Inf. Secur. 7(1), 273\u2013279 (2009)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"issue":"5","key":"541_CR14","first-page":"669","volume":"1","author":"BB Zaidan","year":"2009","unstructured":"B.B. Zaidan, A.A. Zaidan, F. Othman, New technique of hidden data in PE-file with in unused area one. Int. J. Comput. Electrical Eng. (IJCEE) 1(5), 669\u2013678 (2009)","journal-title":"Int. J. Comput. Electrical Eng. (IJCEE)"},{"issue":"7","key":"541_CR15","first-page":"218","volume":"9","author":"AW Naji","year":"2009","unstructured":"A.W. Naji, A.A. Zaidan, B.B. Zaidan, et al., New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques. Int. J. Comput. Sci. Netw. Secur. 9(7), 218\u2013224 (2009)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"5","key":"541_CR16","first-page":"125","volume":"10","author":"AA Zaidan","year":"2010","unstructured":"A.A. Zaidan, B.B. Zaidan, A.J. Hamid, A new system for hiding data within (unused area two + image page) of portable executable file using statistical technique and advance encryption standared. Int. J. Comput. Theory Eng. 10(5), 125\u2013131 (2010)","journal-title":"Int. J. Comput. Theory Eng."},{"key":"541_CR17","unstructured":"D. Shin, Y. Kim, K. Byun, et al., in Proceedings of the 6th Australian Digital Forensics Conference. Data hiding in windows executable files (Perth, 2008), pp. 1\u20138"},{"issue":"7","key":"541_CR18","first-page":"2758","volume":"28","author":"L Qian","year":"2011","unstructured":"L. Qian, F. Yong, D. Tan, Z. Changshan, Research on information hiding technology based on unlimited capacity of PE file. Comput. Appl. Res. 28(7), 2758\u20132760 (2011)","journal-title":"Comput. Appl. Res."},{"issue":"01","key":"541_CR19","first-page":"45","volume":"39","author":"W Wei","year":"2015","unstructured":"W. Wei, K. Liu, X. Wan, High capacity information hiding based on PE file format. J. Nanjing Univ. Sci. Technol. 39(01), 45\u201349 (2015)","journal-title":"J. Nanjing Univ. Sci. Technol."},{"key":"541_CR20","unstructured":"Y. Li, X. Shi, Research on PE file information hiding technology. Netw. Secur. Technol. Appl. (11), 51\u201352 (2017)"},{"issue":"3","key":"541_CR21","first-page":"621","volume":"27","author":"X Xu","year":"2007","unstructured":"X. Xu, X. Xu, H. Liang, et al., Information hiding research and scheme implementation of PE file resource section. Comput. Appl. 27(3), 621\u2013623 (2007)","journal-title":"Comput. Appl."},{"issue":"13","key":"541_CR22","first-page":"128","volume":"35","author":"D Qingfeng","year":"2009","unstructured":"D. Qingfeng, Y. Wang, Z. Kaize, W. Xi, Information hiding scheme based on PE file resource data. Comput. Eng. 35(13), 128\u2013130 (2009)","journal-title":"Comput. Eng."},{"issue":"01","key":"541_CR23","first-page":"207","volume":"43","author":"Z Tian","year":"2016","unstructured":"Z. Tian, Y. Li, L. Yang, Research on PE file information hiding technology based on import table migration. Comput. Sci. 43(01), 207\u2013210 (2016)","journal-title":"Comput. Sci."},{"key":"541_CR24","unstructured":"J. Xu, J.F. Li, Y.L. Ye, et al., An information hiding algorithm based on bitmap resource of portable executable file. J. Electron. Sci. Technol., 181\u2013184 (2012)"},{"issue":"supply","key":"541_CR25","first-page":"88","volume":"46","author":"D Qingfeng","year":"2009","unstructured":"D. Qingfeng, W. Yanbo, Z. Xiongwei, Z. Kaize, Spread spectrum software watermarking scheme based on the number of import function references. Comput. Res. Dev. 46(supply), 88\u201392 (2009)","journal-title":"Comput. Res. Dev."},{"issue":"1","key":"541_CR26","first-page":"217","volume":"30","author":"F Long","year":"2010","unstructured":"F. Long, J. Liu, X. Yuan, A software watermark for transforming the structure of PE file import table. Comput. Appl. 30(1), 217\u2013219 (2010)","journal-title":"Comput. Appl."},{"key":"541_CR27","volume-title":"Similarity hash based scoring of portable executable files for efficient malware detection in IoT. Future Generation Computer Systems","author":"AP Namanya","year":"2019","unstructured":"A.P. Namanya, I.U. Awan, J.P. Disso, M. Younas, Similarity hash based scoring of portable executable files for efficient malware detection in IoT. Future Generation Computer Systems (2019)"},{"key":"541_CR28","first-page":"125","volume":"2018","author":"SL Shiva Darshan","year":"2018","unstructured":"S.L. Shiva Darshan, C.D. Jaidhar, Performance evaluation of filter-based feature selection techniques in classifying portable executable files. Proc. Comput. Sci. 2018, 125 (2018)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"541_CR29","doi-asserted-by":"publisher","first-page":"249","DOI":"10.32604\/cmc.2019.04088","volume":"58","author":"X Wang","year":"2019","unstructured":"X. Wang, J. Jianming, Z. Shujing, B. Liang, A fair blind ignature scheme to revoke malicious vehicles in VANETs, computers. Mater. Continua 58(1), 249\u2013262 (2019)","journal-title":"Mater. Continua"},{"key":"541_CR30","doi-asserted-by":"publisher","unstructured":"J. Wang, H. Wang, J. Li, X. Luo, Y.-Q. Shi, S. Kr, Jha, Detecting double JPEG compressed color images with the same quantization matrix in spherical coordinates. IEEE Trans. CSVT (2019). https:\/\/doi.org\/10.1109\/TCSVT","DOI":"10.1109\/TCSVT"},{"issue":"9","key":"541_CR31","first-page":"2775","volume":"29","author":"J Wang","year":"2018","unstructured":"J. Wang, T. Li, X. Luo, Y.-Q. Shi, S. Jha, Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE Trans. CSVT 29(9), 2775\u20132785 (2018)","journal-title":"IEEE Trans. CSVT"},{"issue":"5","key":"541_CR32","first-page":"113","volume":"28","author":"K Chen","year":"2001","unstructured":"K. Chen, Z. Liu, Current situation and progress on decompilation research. Comput. Sci. 28(5), 113\u2013115 (2001)","journal-title":"Comput. Sci."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00541-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-020-00541-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00541-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T20:13:49Z","timestamp":1610223229000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-020-00541-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["541"],"URL":"https:\/\/doi.org\/10.1186\/s13640-020-00541-3","relation":{},"ISSN":["1687-5281"],"issn-type":[{"type":"electronic","value":"1687-5281"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"24 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}