{"title":"基于隐写术的文件系统","authors":"J. Lach","doi":"10.1109/INFTECH.2008.4621617","DOIUrl":null,"url":null,"abstract":"This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"SBFS - steganography based file system\",\"authors\":\"J. Lach\",\"doi\":\"10.1109/INFTECH.2008.4621617\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.\",\"PeriodicalId\":247264,\"journal\":{\"name\":\"2008 1st International Conference on Information Technology\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 1st International Conference on Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFTECH.2008.4621617\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st International Conference on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFTECH.2008.4621617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.