Library Subscription: Guest
Begell Digital Portal Begell Digital Library eBooks Journals References & Proceedings Research Collections
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Print: 0040-2508
ISSN Online: 1943-6009

Volumes:
Volume 78, 2019 Volume 77, 2018 Volume 76, 2017 Volume 75, 2016 Volume 74, 2015 Volume 73, 2014 Volume 72, 2013 Volume 71, 2012 Volume 70, 2011 Volume 69, 2010 Volume 68, 2009 Volume 67, 2008 Volume 66, 2007 Volume 65, 2006 Volume 64, 2005 Volume 63, 2005 Volume 62, 2004 Volume 61, 2004 Volume 60, 2003 Volume 59, 2003 Volume 58, 2002 Volume 57, 2002 Volume 56, 2001 Volume 55, 2001 Volume 54, 2000 Volume 53, 1999 Volume 52, 1998 Volume 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i11.50
pages 973-985

ON HIDING DATA INTO THE STRUCTURE OF THE FAT FAMILY FILE SYSTEM

K.Yu. Shekhanin
V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv 61022, Ukraine
A.O. Kolhatin
V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv 61022, Ukraine
E.E. Demenko
V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv 61022, Ukraine
A. A. Kuznetsov
V. Karazin National University of Kharkiv, 4 Svobody Sq., Kharkiv 61022, Ukraine

ABSTRACT

Methods of technical steganography, namely, those ones based on hiding information messages into the structure of the FAT family file system are studied. The basic method based on changing the numbering of individual clusters of covering files is considered, its advantages and disadvantages are investigated. An improved method is proposed that makes it possible to increase significantly the amount of hidden data. The results of the comparative analysis of the methods of hiding data into the structure of the FAT family file system are given.

REFERENCES

  1. Gorbenko, I.D. and Gorbenko, Yu.I., (2013) Applied Cryptology. Theory. Practice. Application, Kharkiv, Ukraine: Fort, 880 p., (in Ukrainian).

  2. Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A., (1997) Handbook of Applied Cryptography, CRC Press, 794 p.

  3. Ferguson, N. and Schneier, B., (2003) Practical Cryptography, John Wiley & Sons, 432 p.

  4. Petitcolas, F., Anderson, R.J., and Kuhn, M.G., (1999) Information Hiding, Proceedings IEEE, 87(7), pp. 1069-1078.

  5. Konakhovich, G.F. and Puzirenko, O.Yu., (2006) Computer Steganography. Theory and Practice, Kyiv, Ukraine: MK-Press, 288 p., (in Russian).

  6. Gribunin, V.G., Okov, I.N., and Turintsev, I.V., (2002) Digital Steganography, Moscow, Russia: Solon-Press, 272 p., (in Russian).

  7. Khoroshko, V.A. and Shelest, M.E., (2002) Introduction to Computer Steganography, Kyiv, Ukraine: 140 p., (in Russian).

  8. Gorbenko, I.D., (2004) Information Protection in ITS. Cryptographic Protection of Information, Kharkiv, Ukraine: KNURE, 376 p., (in Ukrainian).

  9. Peskova, O.Yu. and Halaburda, G.Yu., (2012) The use of network steganography to protect data transmitted via open Internet channels, Inform. systems for scientific research (IMS-2012), XV Conf. ''Internet and modern society'' (IMS-2012), St. Petersburg, Russia: Nat. ex. un-t inform. technology, mechanics and optics, pp. 348-354, http://ojs.ifmo.ru/index.php/IMS/article/download/132/132 (in Russian).

  10. Kuznetsov, A.A. and Kovalenko, O.Yu., (2015) Steganographic information protection using 3D printing. Information security of the state, society and personality, Tez Vseukr. Science.-Pract. Conf., Kirovograd City: KNTU, pp. 91-92, (in Russian).

  11. Hassan Khan, Mobin Javed, Syed Ali Khayam, and Fauzan Mirza, (2011), Designing a cluster-based covert channel to evade disk investigation and forensics, Computers & Security, 30(1).

  12. Hassan Khan, Mobin Javed, Fauzan Mirza, Evading Disk Investigation and Forensics using a Cluster- Based Covert Channel, National University of Science & Technology (NUST), Islamabad 44000, Pakistan.

  13. Nerijus Morkevicius, Grigas Petraitis, Algimantas Venckauskas, and Jonas Ceponis, (2013), Covert Channel for Cluster-based File Systems Using Multiple Cover Files, Information Technology and Control, 42(3), p 32.

  14. Kuznetsov, A.A., Schwager, A.S., and Fesenko, D.A., (2015) Data hiding in cluster file systems, Radiotechnika, 181, pp. 86-100, (in Russian).


Articles with similar content:

EMPLOYMENT OF INTELLIGENT TECHNOLOGIES IN MULTIPARAMETRIC CONTROL SYSTEMS
Telecommunications and Radio Engineering, Vol.75, 2016, issue 19
V. A. Gorokhovatskiy, А. А. Zamula
Approximate Algorithms for Estimating Trends in Financial Intelligence Tasks. Part II. Instants of Origination of Elements of Financial Flow are Unknown
Journal of Automation and Information Sciences, Vol.50, 2018, issue 2
Farit F. Idrisov
INTELLECTUAL DATA PROCESSING AND SELF-ORGANIZATION OF STRUCTURAL FEATURES AT RECOGNITION OF VISUAL OBJECTS
Telecommunications and Radio Engineering, Vol.75, 2016, issue 2
V. A. Gorokhovatskiy, A. Ye. Berestovsky, A. V. Gorokhovatskiy
DETECTION OF OBJECT MOTIONS CONCEALED BEHIND FOLIAGE OF BUSHES AND TREES USING ENTROPY OF THE PHASE STRUCTURE OF RADAR SIGNALS
Telecommunications and Radio Engineering, Vol.76, 2017, issue 20
V. G. Sugak
The Conceptual Model of the Multi-Agent System for Formation of the Descriptions of Local Security Threats to RF Subjects
Telecommunications and Radio Engineering, Vol.62, 2004, issue 1-6
Ivan S. Zakharov, A. T. Mirgaleev, S. P. Yushchenko