US 12,147,538 B2
Steganographic modification detection and mitigation for enhanced enterprise security
Matthew Murray, Roanoke, TX (US); Garrett Botkin, Charlotte, NC (US); and Dustin Stocks, Stallings, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Jul. 25, 2022, as Appl. No. 17/872,354.
Prior Publication US 2024/0028727 A1, Jan. 25, 2024
Int. Cl. G06F 21/53 (2013.01); G06F 21/56 (2013.01); G06T 1/00 (2006.01); G06T 7/90 (2017.01)
CPC G06F 21/568 (2013.01) [G06F 21/53 (2013.01); G06F 21/566 (2013.01); G06T 7/90 (2017.01); G06T 2207/10024 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computing platform, comprising:
at least one processor;
a communication interface communicatively coupled to the at least one processor; and
a memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive a first image, embedded with steganographic modifications comprising modifications to one or bits of a plurality of pixels of the first image, wherein the steganographic modifications comprise malicious software;
generate a copy of the first image;
generate a safe first image of the copy of the first image by changing or modifying one or more bits beginning from a least significant bit of at least one pixel of the copy of the first image, wherein generating the safe first image of the copy of the first image renders the steganographic modifications ineffective;
route the safe first image to a first user device;
route the first image to an isolation zone system;
automatically cause, at the isolation zone system through one or more commands directing the isolation zone system to execute the steganographic modifications of the first image, execution of the steganographic modifications of the first image; and
perform, based on results of the execution of the steganographic modifications of the first image in the isolation zone system, one or more security actions.