Affiliation:
1. Sinhgad Institute of Technology, Lonavala, Maharashtra, India
Abstract
Cyberattacks on people, companies, and organizations have grown in frequency. Cybercriminals are constantly searching for efficient ways to infect targets with malware in order to initiate an attack. Millions of people use images every day all throughout the world, and the majority of users think pictures to be secure for usage, however some kinds of pictures have the potential to carry a malware payload and execute detrimental acts. The main reason JPEG is the most widely used image format is because of its lossy compression. It’s applied almost everyone, from small businesses to major corporations, and is present on nearly all devices (on digital cameras, cellphones, social networking, websites, etc.). Due of their reputation for being innocuous, enormous JPEG images have a lot of potential for misuse
Reference14 articles.
1. [1].pp. 7–11, 2014. 2. E. S. Solutions and Q. Heal, “Quick Heal Quarterly Threat Report | Q1 2017,” 2017 url:http://www.quickheal.co.in/resources/threat-reports . [Accessed: 13-june-2017].
2. [2]. A. Govindaraju, “Exhaustive Statistical Analysis for Detection of Metamorphic Malware,” Master’s project report, Department of Computer Science, San Jose State University, 2010.
3. [3]. M. G. Schultz, E. Eskin, and S. J. Stolfo, “Data Mining Methods for Detection of New Malicious Executables,” 2001.
4. [4]. D. Bilar, “Opcodes As Predictor for Malware,” International Journal of Electronic Security and Digital Forensics, vol. 1, no. 2, pp. 156–168, 2007.
5. [5]. Y. Elovici, A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer, “Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic,” Annual Conference on Artificial Intelligence. Springer Berlin Heidelberg, pp. 44–50, 2007.