Duplicate File Names-A Novel Steganographic Data Hiding Technique
نویسندگان
چکیده
Data hiding has been an integral part of human society from the very early days dating back to BC. It has played its role for both good and bad purposes. First instances of data hiding dates back to 440 B.C. and has been cited in several works as one of the first known and recorded use of steganography. Several complicated Steganographic techniques have been proposed in the past decade to deceive the detection mechanisms. Steganalysis has also been one of the corner stones of research in the recent past to thwart such attempts of the adversary to subterfuge detection. In this paper we present a novel, simple, and easy to implement data hiding technique for hiding files with duplicate names. The proposed file hiding technique Duplicate File Names uses an innocuous file as the cover medium exploiting its name and reputation as a good file. This vulnerability was first discovered on a Windows 98 machine with DOS 6.1. We have tested this vulnerability on several different file systems to confirm that the vulnerability exists across file systems and not specific to older Windows file systems. Finally, we have discussed using this method for legitimate data hiding as well as detecting when employed for illegitimate data hiding.
منابع مشابه
An Image High Capacity Steganographic Methods By Modified OPA Algorithm And Haar Wavelet Transform
Steganography is the art and science of hidingcommunication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can ...
متن کاملEnhancing File Security by Integrating Steganography Technique in Linux Kernel
In today‟s world securing file data is very important. The proposed Secure File System (SFS) provides file data security using steganographic techniques in a transparent and convenient way. The proposed SFS pushes information hiding services into the Linux kernel space, mounting it between the Virtual File System layer and underlying file system. After SFS is integrated with the Linux operating...
متن کاملAnalysis and Implementation of Distinct Steganographic Methods
In this paper, different steganographic methods have been analyzed and implementations of those techniques have been performed. Those methods include hiding in text, hiding in audio file, hiding in file system, and hiding in image files.
متن کاملReversible Steganographic Technique Based on IWT for Enhanced Security
Steganography is used to hide a secret message within a cover image, thereby yielding a stego image such that even the trace of the presence of secret information is wiped out. The purpose of steganography is to maintain secret communication between two users. Steganography has several technical challenges namely high hiding capacity and imperceptibility. Steganographic technique with Integer W...
متن کاملDesigning an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization
The growing possibilities of modern communication need the special means of security especially on computer network. Data security in the last few years has gained a wider audience. In this paper we have discussed a new steganographic technique based on the file hybridization. In contrast to other methods of steganography where data embedding in image work on the principle of only one image fil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011