{"title":"SBFS - steganography based file system","authors":"J. Lach","doi":"10.1109/INFTECH.2008.4621617","DOIUrl":null,"url":null,"abstract":"This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st International Conference on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFTECH.2008.4621617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.