
sion such as HTML (as in stegosploit), .txt, .pdf, etc.
However, stegowiper filters the content based on the
HTTP content type and applies the prevention tech-
nique if the content type is an image. Thus, the Ste-
gowiper can not prevent stegosploit attacks due to the
attacker evading the image in the HTML file. Our
browser extension will remove images in webpages if
they are embedded inside the webpage or images re-
named as different file types and used as the image
source in the webpage.
To analyse user convenience we measured the pro-
cessing time or delay caused by the extension on most
used sites such as Google, Wikipedia, Linkedin, etc.,
We observed that, the delay caused by the browser
extension for processing the images with size ≤ 1KB
is less than 1ms. If the image size is around 100KB,
the time required is a maximum of 100ms, and for a
1MB image, the maximum delay is 300ms. The tim-
ing analysis is tabulated in Table 2 (time required to
process image in webpage by extension) We observe
that most frequently used standard websites use im-
ages of size ≤ 50KB for better performance or to re-
duce the loading time.
Table 2: Size of image vs Delay.
Size of Image Delay
< 1 KB < 1 ms
≈ 100 KB ≈ 100 ms
≈ 1 MB ≈ 300 ms
5 CONCLUSION
Digitalization has significantly increased the attack
surface, making robust cybersecurity measures more
critical than ever to protect sensitive information and
ensure system integrity. As cyber-attacks become
more sophisticated, cyber security issues pose signif-
icant threats to individuals and organizations. The
sophistication includes packing malware or potential
threats within images or media files using steganog-
raphy and polyglot methods, making detection and
prevention more challenging for traditional security
measures. Because browsers are widely used for in-
ternet access, they are the prime vector for attackers to
exploit vulnerabilities, execute malicious scripts, and
deliver hidden payloads through techniques such as
steganography and polyglot files. A robust browser-
integrated approach for preventing Stego-malware
was implemented and tested in real-time. The im-
age reconstruction removes the data hidden inside
the header sections and regenerates the pixels. The
experimental results indicate that the Stegoslayer is
more effective and reliable compared to stegomal-
ware prevention techniques such as stegowiper. The
Stegoslayer is able to prevent more sophisticated at-
tacks than stegowiper without losing the image qual-
ity. The Stegoslayer achieves 20% higher PSNR value
over the stegowiper images indicating improved qual-
ity.
REFERENCES
Addison Howard, GIBOULOT Quentin, P. R. C. W. C.
(2020). Alaska2 image steganalysis.
Albertini, A. (2015). Funky file formats. The International
Journal of PoC||GTFo7.
Alfonso Mu
˜
noz, D. M. U. (2022). stegowiper: powerful
and flexible active attack for disrupting stegomalware.
https://github.com/mindcrypt/stegowiper.git.
Caviglione, L. and Mazurczyk, W. (2022). Never mind the
malware, here’s the stegomalware. IEEE Security &
Privacy, 20(5):101–106.
Cohen, A., Nissim, N., and Elovici, Y. (2020). Maljpeg:
Machine learning based solution for the detection of
malicious jpeg images. IEEE Access, 8:19997–20011.
Cyble (2022). Stegomalware identifying possible attack
vectors. Accessed: 2024-04-28.
Developers, P. (2025). Pillow (PIL Fork) Documentation.
Accessed: 2025-01-06.
Guerreiro, M. (2024). DocBleach - an advanced content dis-
arm and reconstruction software. https://github.com/
docbleach/DocBleach. Accessed: 2024-12-17.
Inc., G. (2025). WebP: Lossless and Lossy Image Compres-
sion. Accessed: 2025-01-06.
Karras, T., Laine, S., and Aila, T. (2018). Flickr-
faces-hq (ffhq) dataset. https://github.com/NVlabs/
ffhq-dataset.
Petrosyan, A. (2024). Internet and social media users in the
world 2024. Accessed: 2025-01-07.
Provos, N. (2001). OutGuess steganography tool. https:
//www.outguess.org/. Accessed: 2024-07-04.
Shah, S. (2015). Stegosploit: Weaponized Polyglots
as Browser Exploits. The International Journal of
PoC||GTFo8.
Vaidya, S. (2024). OpenStego - free steganography soft-
ware. https://www.openstego.com. Accessed: 2024-
07-04.
VirusShare (2024). https://virusshare.com. Accessed:
2024-06-24.
Westfeld, A. (2001). F5—a steganographic algorithm. In
Moskowitz, I. S., editor, Information Hiding, pages
289–302, Berlin, Heidelberg. Springer Berlin Heidel-
berg.
Zuppelli, M., Manco, G., Caviglione, L., and Guarascio,
M. (2021). Sanitization of images containing stego-
malware via machine learning approaches. In Italian
Conference on Cybersecurity.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
606