×

Steganographic file system based on JPEG files. (English) Zbl 1345.94099

Summary: A steganographic system provides a hidden communication channel in background of a public channel. The existence of the hidden channel must remain secret, i.e. the adversary cannot decide whether the public channel contains any covert information or not. The public channel that is used in construction of a steganographic system can often be embedded in a static file (medium), that is called a carrier (if the steganographic information is present). Most of the current research focuses on a single medium. The most suitable types of media, such as images or music files, contain a lot of redundancy. Small changes in the redundant parts are not easily detected. However, new methods for the detection of this information are developed along with the new algorithms for embedding the hidden information. Our work describes a new steganographic system design, where the hidden information is spread among many static images in a form of a virtual steganographic filesystem. We note that the implementation of the system must also take into account “steganographic side-channels”, i.e., some information channels that are present in the operating system (in our case Linux, and Android) that leak information about the presence of the hidden channel.

MSC:

94B05 Linear codes (general theory)
68P30 Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science)
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory

Software:

Keccak; StegFS
PDF BibTeX XML Cite
Full Text: DOI Link

References:

[1] JÓKAY, M.- MORAVČÍK, T,: Image-based JPEG steganography, Tatra Mt. Math. Publ. 45 (2010), 65-74. · Zbl 1274.68120
[2] ANDERSON, R.-NEEDHAM, R.-SHAMIR, A.: The steganographic file system, in: Information Hiding, Second InternationalWorkshop, IH’ 98, Portland, Oregon, USA, April 15-17 , LNCS Vol. 1525, Springer-Verlag, 1998, pp. 73-82.
[3] MCDONALD, A. D.-KUHN, M. G.: StegFs: A steganographic file system for Linux, , in: LNCS Vol. 1768, Springer-Verlag Berlin, 2000, pp. 463-477.
[4] BERTONI, G.-DAEMEN, J.-PEETERS, M.-VAN ASSCHE, G.: The Keccak reference, NIST SHA-3, 2011 (submission). · Zbl 1306.94028
[5] TUNG HOANG, V.-ROGAWAY, P.: On generalized Feistel networks, in: Proceedings of the 30-th annual conference on Advances in cryptology (CRYPTO’10), Springer-Verlag, Berlin, Heidelberg, 2010, pp. 613-630. · Zbl 1283.94068
[6] BATEMAN, P.: Image Steganography and Steganalysis, Diploma thesis, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, 2008.
[7] WESTFELD, A.: F5-a Steganographic Algorithm: High Capacity Despite Better Steganalysis, in: 4-th International Workshop on Information Hiding, 2001. · Zbl 1010.68745
[8] NAG, A.-SINGH, J. P.-KHAN, S.-GHOSH, S.-BISWAS, S.-SARKAR, D.- SARKAR, P. P: A Weighted Location Based LSB Image Steganography Technique, in: Advances in Computing and Communications, ACC 2011 Conference Communications in Computer and Information Science, Vol. 191, Springer-Verlag, Berlin, 2011, pp. 620-627.
[9] GRO\check SEK, O.-VOJVODA, M.-ZAJAC, P.: Classical Ciphers, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, 2007.
[10] CHANG, K.: Knowledge file system in: A Principled Approach to Personal Information Management, 2010, IEEE International Conference on Data Mining Workshops, 2010.
[11] KATZENBEISSER, S.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers, London, 1999.
[12] FREE SOFTWARE FOUNDATION, INC.: The GNU C Library Manual: File Times, 2013, http://www.gnu.org/software/libc/manual/html_node/File-Times.html.
[13] OLIBONI, C.: OpenPuff, http://embeddedsw.net/OpenPuff_Steganography_Home.html.
[14] PAUL, H.-UPHAM, D.: JSteg, http://zooid.org/ paul/crypto/jsteg.
[15] HETZL, S.: StegHide, http://steghide.sourceforge.net.
[16] LATHAM, A.: JP Hide & JP Seek, http://linux01.gwdg.de/ alatham/stego.html.
[17] PROVOS, N.: OutGuess, http://www.outguess.org.
[18] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming Codes and Wet Paper Codes, in: Information Hiding, 10th International Workshop, 2008, pp. 60-71.
[19] CHANDRAMOULI, R.-KHARAZZI, M.-MEMON, N.: Image steganography and steganalysis: Concepts and practice, in: International Workshop on Digital Watermarking, 2003, LNCS Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.
[20] ZAJAC, P.: Remarks on the NFS complexity, Tatra Mt. Math. Publ. 41 (2008), 79-91. · Zbl 1240.94108
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.