Steganographic file system (original) (raw)

Property Value
dbo:abstract Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size files originally consisting of random bits on top of which 'vectors' could be superimposed in such a way as to allow levels of security to decrypt all lower levels but not even know of the existence of any higher levels, or an entire partition is filled with random bits and files hidden in it. In a steganographic file system using the second scheme, files are not merely stored, nor stored encrypted, but the entire partition is randomized - encrypted files strongly resemble randomized sections of the partition, and so when files are stored on the partition, there is no easy way to discern between meaningless gibberish and the actual encrypted files. Furthermore, locations of files are derived from the key for the files, and the locations are hidden and available to only programs with the passphrase. This leads to the problem that very quickly files can overwrite each other (because of the Birthday Paradox); this is compensated for by writing all files in multiple places to lessen the chance of data loss. (en)
dbo:wikiPageExternalLink http://magikfs.sourceforge.net/ http://www.evilbitz.com/2006/10/22/an-mp3-steganographic-file-system-approach/ http://www.l3s.de/~zhou/Publication/StegFS-thesis.pdf http://csdl.computer.org/comp/proceedings/icde/2003/2071/00/20710657abs.htm http://csdl.computer.org/comp/proceedings/icde/2004/2065/00/20650572abs.htm http://www.cl.cam.ac.uk/~rja14/Papers/stego-fs.pdf
dbo:wikiPageID 4653994 (xsd:integer)
dbo:wikiPageLength 4963 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID 1068284709 (xsd:integer)
dbo:wikiPageWikiLink dbr:Poul-Henning_Kamp dbr:Roger_Needham dbr:Ross_J._Anderson dbr:Rubber-hose_cryptanalysis dbr:Encryption dbr:Steganography_tools dbr:StegFS dbr:Steganography dbr:Computer_file dbr:Key_(cryptography) dbr:BPCS-Steganography dbr:TrueCrypt dbr:Disk_partitioning dbr:GBDE dbr:Adi_Shamir dbc:Steganography dbr:PDF dbc:Disk_file_systems dbr:Plausible_deniability dbr:File_system dbr:Filesystem-level_encryption dbr:Loop_device dbr:Gibberish dbr:Threat_model dbr:ScramDisk dbr:Birthday_Paradox dbr:PNGDrive
dbp:wikiPageUsesTemplate dbt:Div_col dbt:Div_col_end dbt:Fact dbt:Reflist dbt:File_systems
dct:subject dbc:Steganography dbc:Disk_file_systems
gold:hypernym dbr:Kind
rdf:type yago:Abstraction100002137 yago:Arrangement105726596 yago:ClassificationSystem105727220 yago:Cognition100023271 yago:FileSystem105732614 yago:PsychologicalFeature100023100 yago:Structure105726345 yago:WikicatDiskFileSystems
rdfs:comment Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size files originally consisting of random bits on top of which 'vectors' could be superimposed in such a way as to allow levels of security to decrypt all lower levels but not even know of the existence of any higher levels, or an entire partition is filled with random bits and files hidden in it. (en)
rdfs:label Steganographic file system (en)
owl:sameAs freebase:Steganographic file system yago-res:Steganographic file system wikidata:Steganographic file system https://global.dbpedia.org/id/4vjPT
prov:wasDerivedFrom wikipedia-en:Steganographic_file_system?oldid=1068284709&ns=0
foaf:isPrimaryTopicOf wikipedia-en:Steganographic_file_system
is dbo:wikiPageRedirects of dbr:Steganographic_filesystem
is dbo:wikiPageWikiLink of dbr:Steganography_tools dbr:Steganalysis dbr:StegFS dbr:BPCS-steganography dbr:Filesystem-level_encryption dbr:Ext2 dbr:Steganographic_filesystem
is dbp:fullName of dbr:StegFS
is foaf:primaryTopic of wikipedia-en:Steganographic_file_system