Citrix Systems, Inc.
Image steganography detection
Last updated:
Abstract:
In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.
Status:
Grant
Type:
Utility
Filling date:
18 Jun 2021
Issue date:
14 Jun 2022