Hiding data in the file structure

  • Aleksandr Kuznetsov V. N. Karazin Kharkiv National University, Kharkiv
  • Kiril Shekhanin V. N. Karazin Kharkiv National University, Kharkiv.
  • Andriy Kolgatin V. N. Karazin Kharkiv National University
  • Katerina Kuznetsova V. N. Karazin Kharkiv National University
  • Yevgeny Demenko V. N. Karazin Kharkiv National University
Keywords: steganography;, hiding information data;, file system;

Abstract

In this paper, the methods of steganography hiding of information in a file system structure is investigated. Namely, the structure of the FAT file system (File Allocation Table) and methods of hiding information messages, which are based on repositioning separate clusters of cover files. A new method is proposed that, unlike the known ones, changes the order of alternation of clusters in each cover file, which allows to further hide a certain informational message, that is, to increase the capacity of the hidden channel. It was confirmed that the results of the data concealment and deletion procedures largely depend on the number of clusters with which it is necessary to carry out the appropriate transformations. It is noted that the extraction procedure is performed  much faster than hiding the message. The proposed method is implemented programmatically, the results of experimental researches confirmed the adequacy of the theoretical conclusions and recommendations.

Downloads

Download data is not yet available.

Author Biographies

Aleksandr Kuznetsov, V. N. Karazin Kharkiv National University, Kharkiv

Doctor of Sciences (Engineering), Full Prof., Academician of the Academy of Applied Radioelectronics Sciences.

Kiril Shekhanin, V. N. Karazin Kharkiv National University, Kharkiv.

Postgraduate CSD

Andriy Kolgatin, V. N. Karazin Kharkiv National University

Student CSD

Katerina Kuznetsova, V. N. Karazin Kharkiv National University

Student CSD, V. N. Karazin Kharkiv National University.

Yevgeny Demenko, V. N. Karazin Kharkiv National University

Student of CSD

References

S. Katzenbeisser, F. A. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking, Norwood, MA, USA: Artech House, 2000, 220 p.

F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn. "Information hiding-a survey," in Proc. of the IEEE, Vol. 87, No. 7, pp. 1062-1078, Jul 1999.

W. Mazurczyk, M. Smolarczyk, K. Szczypiorski. "Retransmission steganography and its detection", Soft Computing, Vol. 15, No. 3, pp. 505-515, 2011.

S. Nair, A. Kumar, A. Sur and S. Nandi. "Length based network steganography using UDP protocol". 2011 IEEE 3rd Int. Confer-ence on Communication Software and Networks, Xi'an, 2011, pp. 726-730.

K. Ahsan and D. Kundur. "Practical data hiding in TCP lIP", In: ACM Workshop on Multimedia and Security, 2002, [On-line]. Internet: http://ee.tamu.edu/deepalpdf/acm02.pdf

S. H. Sellke, C. Wang, S. Bagchi, and N. B. Shroff. "TCP/IP Timing Channels: Theory to Implementation", pp. 2204-2212, 2009.

V. Itier, W. Puech and A. G. Bors. "Cryptanalysis aspects in 3-D watermarking". 2014 IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 4772-4776.

Yang, Qin, Liujie, Sun, and Wenju, Wang. "A robust watermarking scheme for 3D models based on encrypted holographic algo-rithm". Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things, Harbin, 2015, pp. 85-89.

Z. Li, S. Beugnon, W. Puech, and A. G. Bors. "Rethinking the high capacity 3D steganography: Increasing its resistance to ste-ganalysis". 2017 IEEE (ICIP), Beijing, 2017, pp. 510-414.

S. F. Liu, S. Pei, X. Y. Huang, and L. Tian. "File hiding based on FAT file system". 2009 IEEE International Symposium on IT in Medicine & Education, Jinan, 2009, pp. 1198-1201.

J. Davis, J. MacLean and D. Dampier. "Methods of Information Hiding and Detection in File Systems". 2010 Fifth IEEE Interna-tional Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, 2010, pp. 66-69.

H. Khan, M. Javed, S.A. Khayam, F. Mirza. “Designing a cluster-based covert channel to evade disk investigation and forensics”. Computers & Security, Vol. 30, Issue 1, January 2011. [On-line]. Internet: https://www.sciencedirect.com/science/article/pii/S016740481000088X

H. Khan, M. Javed, S.A. Khayam, F. Mirza. “Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel”. National University of Science & Technology (NUST), Islamabad 44000, Pakistan. [On-line]. Internet: https://www.sigsac.org/ccs/CCS2009/pd/abstract_17.pdf

N. Morkevičius, G. Petraitis, A. Venčkauskas, J. Čeponis. “Covert Channel for Cluster-based File Systems Using Multiple Cover Files”. Information Technology and Control, 2013, Vol. 42, No.3. pp. 32. [On-line]. Internet: http://itc.ktu.lt/index.php/ITC/article/view/3328 .

L. Yang, P. Chen, G. Zhu, and L. Yu. "Repairing algorithm design for FAT file system in embedded system". 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet), XianNing, 2011, pp. 3393-3396.

Z. Jinhai. "Research of embedded FAT file system". 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering, Bali, 2011, pp. 44-47.

H. Zhao, X. Li, L. Chang, and X. Zang, "Fat File System Design and Research". 2015 International Conference on Network and Information Systems for Computers, Wuhan, 2015, pp. 568-571.

Published
2018-11-26
Cited
How to Cite
Kuznetsov, A., Shekhanin, K., Kolgatin, A., Kuznetsova, K., & Demenko, Y. (2018). Hiding data in the file structure. Computer Science and Cybersecurity, 9(1), 43-52. Retrieved from https://periodicals.karazin.ua/cscs/article/view/12013
Section
Статті