dbo:abstract |
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size files originally consisting of random bits on top of which 'vectors' could be superimposed in such a way as to allow levels of security to decrypt all lower levels but not even know of the existence of any higher levels, or an entire partition is filled with random bits and files hidden in it. In a steganographic file system using the second scheme, files are not merely stored, nor stored encrypted, but the entire partition is randomized - encrypted files strongly resemble randomized sections of the partition, and so when files are stored on the partition, there is no easy way to discern between meaningless gibberish and the actual encrypted files. Furthermore, locations of files are derived from the key for the files, and the locations are hidden and available to only programs with the passphrase. This leads to the problem that very quickly files can overwrite each other (because of the Birthday Paradox); this is compensated for by writing all files in multiple places to lessen the chance of data loss. (en) |
dbo:wikiPageExternalLink |
http://magikfs.sourceforge.net/ http://www.evilbitz.com/2006/10/22/an-mp3-steganographic-file-system-approach/ http://www.l3s.de/~zhou/Publication/StegFS-thesis.pdf http://csdl.computer.org/comp/proceedings/icde/2003/2071/00/20710657abs.htm http://csdl.computer.org/comp/proceedings/icde/2004/2065/00/20650572abs.htm http://www.cl.cam.ac.uk/~rja14/Papers/stego-fs.pdf |
dbo:wikiPageID |
4653994 (xsd:integer) |
dbo:wikiPageLength |
4963 (xsd:nonNegativeInteger) |
dbo:wikiPageRevisionID |
1068284709 (xsd:integer) |
dbo:wikiPageWikiLink |
dbr:Poul-Henning_Kamp dbr:Roger_Needham dbr:Ross_J._Anderson dbr:Rubber-hose_cryptanalysis dbr:Encryption dbr:Steganography_tools dbr:StegFS dbr:Steganography dbr:Computer_file dbr:Key_(cryptography) dbr:BPCS-Steganography dbr:TrueCrypt dbr:Disk_partitioning dbr:GBDE dbr:Adi_Shamir dbc:Steganography dbr:PDF dbc:Disk_file_systems dbr:Plausible_deniability dbr:File_system dbr:Filesystem-level_encryption dbr:Loop_device dbr:Gibberish dbr:Threat_model dbr:ScramDisk dbr:Birthday_Paradox dbr:PNGDrive |
dbp:wikiPageUsesTemplate |
dbt:Div_col dbt:Div_col_end dbt:Fact dbt:Reflist dbt:File_systems |
dct:subject |
dbc:Steganography dbc:Disk_file_systems |
gold:hypernym |
dbr:Kind |
rdf:type |
yago:Abstraction100002137 yago:Arrangement105726596 yago:ClassificationSystem105727220 yago:Cognition100023271 yago:FileSystem105732614 yago:PsychologicalFeature100023100 yago:Structure105726345 yago:WikicatDiskFileSystems |
rdfs:comment |
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size files originally consisting of random bits on top of which 'vectors' could be superimposed in such a way as to allow levels of security to decrypt all lower levels but not even know of the existence of any higher levels, or an entire partition is filled with random bits and files hidden in it. (en) |
rdfs:label |
Steganographic file system (en) |
owl:sameAs |
freebase:Steganographic file system yago-res:Steganographic file system wikidata:Steganographic file system https://global.dbpedia.org/id/4vjPT |
prov:wasDerivedFrom |
wikipedia-en:Steganographic_file_system?oldid=1068284709&ns=0 |
foaf:isPrimaryTopicOf |
wikipedia-en:Steganographic_file_system |
is dbo:wikiPageRedirects of |
dbr:Steganographic_filesystem |
is dbo:wikiPageWikiLink of |
dbr:Steganography_tools dbr:Steganalysis dbr:StegFS dbr:BPCS-steganography dbr:Filesystem-level_encryption dbr:Ext2 dbr:Steganographic_filesystem |
is dbp:fullName of |
dbr:StegFS |
is foaf:primaryTopic of |
wikipedia-en:Steganographic_file_system |