PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES

Authors

  • Denys Samoilenko National University of Shipbuilding after Admiral Makarov, Mykolaiv, Ukraine

DOI:

https://doi.org/10.18372/2306-1472.67.10431

Keywords:

data protection, digital watermarks, information security, program code, steganography

Abstract

Purpose: One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. Methods: We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. Results: We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. Discussion: Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.

Author Biography

Denys Samoilenko, National University of Shipbuilding after Admiral Makarov, Mykolaiv, Ukraine

PhD, Associate Professor.

Ship Electrical Equipment and Information Security Department,

National University of Shipbuilding after Admiral Makarov, Mykolaiv, Ukraine.

Education: Taras Shevchenko National University of Kyiv, Ukraine (2000).

Research area: information security of network resources.

References

Cachin, C. Digital Steganography [WWW document]/ Christian Cachin // IBM Research Zurich Research Laboratory CH-8803 Rüschlikon, Switzerland cca@zurich.ibm.com February 17, 2005 – Access from: https://www.zurich.ibm.com/~cca/ papers/encyc.pdf

Simmons, G. J. The Prisoners’ Problem and the Subliminal Channel [Text] / G. J. Simmons // Advances in Cryptology. – 1985, Vol. 209, Р. 364–378.

Bäcker, C. Subliminal Channels in Cryptographic Systems [WWW document]/Christian Bäcker/ – Access from: http://citeseerx.ist.psu.edu/ viewdoc/download?doi=10.1.1.392.8043&rep=rep1&type=pdf

Simmons, G. J. Authentication Theory / Coding Theory [Text] / G. J. Simmons // Advances in Cryptology. – 1985. – Vol. 196. – Р. 411–431.

Pei, D. Y. Authentication Schemes [WWW document] / D. Y. Pei. // Singapore: Institute for Mathematical Sciences.– 2001. – 36 p. – Access from: www2.ims.nus.edu.sg.

Zhang, F., Lee, B., Kim, K. Exploring Signature Schemes with Subliminal Channel / Fangguo Zhang, Byoungcheon Lee, Kwangjo Kim // SCIS 2003 The 2003 Symposium on Cryptography and Information Security Hamamatsu,Japan, Jan. 26-29, 2003 The Institute of Electronics, Information and Communication Engineers

Samoilenko D., Miroshnichenko O., Popov D. Fractal images usage for printed production protection. [Text] / Kvalilohiya book : Coll. Science. pr. / Eng. Acad. printing., 2010, № 2 (18), p. 77-81

Michaud, E. Current Steganography Tools and Methods (Use offense to inform defense. Find flaws before the bad guys do.) [WWW document] / Erin Michaud / SANS Institute, As part of GIAC practical repository, 2003 Access from: https://cyber-defense.sans.org/resources/papers/ gsec/current-steganography-tools-methods-104695

Agarwal, M. Text steganographic approaches: a comparison [Text] / Monika Agarwal // International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013

Sagan, C. 10 Data Hiding in Text [WWW document] Access from: http://www.springer.com /cda/content/document/cda_downloaddocument/9780387003115-c10.pdf

Garg, M. A. Novel Text Steganography Technique Based on Html Documents [Text] / International Journal of Advanced Science and Technology Vol. 35, October, 2011

Wagner D. J. The Combinatorics of the Permutation Enumeration of Wreath Products between Cyclic and Symmetric Groups. PhD Thesis in Mathematics. [WWW document] / University of California, San Diego Access from: https://math.ucsd.edu/~thesis/thesis/jwagner/

Published

21-06-2016

How to Cite

Samoilenko, D. (2016). PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES. Proceedings of National Aviation University, 67(2), 44–51. https://doi.org/10.18372/2306-1472.67.10431

Issue

Section

INFORMATION TECHNOLOGY