Выходит 12 номеров в год
ISSN Печать: 0040-2508
ISSN Онлайн: 1943-6009
Indexed in
ON HIDING DATA INTO THE STRUCTURE OF THE FAT FAMILY FILE SYSTEM
Краткое описание
Methods of technical steganography, namely, those ones based on hiding information messages into the structure of the FAT family file system are studied. The basic method based on changing the numbering of individual clusters of covering files is considered, its advantages and disadvantages are investigated. An improved method is proposed that makes it possible to increase significantly the amount of hidden data. The results of the comparative analysis of the methods of hiding data into the structure of the FAT family file system are given.
-
Gorbenko, I.D. and Gorbenko, Yu.I., (2013) Applied Cryptology. Theory. Practice. Application, Kharkiv, Ukraine: Fort, 880 p., (in Ukrainian).
-
Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A., (1997) Handbook of Applied Cryptography, CRC Press, 794 p.
-
Ferguson, N. and Schneier, B., (2003) Practical Cryptography, John Wiley & Sons, 432 p.
-
Petitcolas, F., Anderson, R.J., and Kuhn, M.G., (1999) Information Hiding, Proceedings IEEE, 87(7), pp. 1069-1078.
-
Konakhovich, G.F. and Puzirenko, O.Yu., (2006) Computer Steganography. Theory and Practice, Kyiv, Ukraine: MK-Press, 288 p., (in Russian).
-
Gribunin, V.G., Okov, I.N., and Turintsev, I.V., (2002) Digital Steganography, Moscow, Russia: Solon-Press, 272 p., (in Russian).
-
Khoroshko, V.A. and Shelest, M.E., (2002) Introduction to Computer Steganography, Kyiv, Ukraine: 140 p., (in Russian).
-
Gorbenko, I.D., (2004) Information Protection in ITS. Cryptographic Protection of Information, Kharkiv, Ukraine: KNURE, 376 p., (in Ukrainian).
-
Peskova, O.Yu. and Halaburda, G.Yu., (2012) The use of network steganography to protect data transmitted via open Internet channels, Inform. systems for scientific research (IMS-2012), XV Conf. ''Internet and modern society'' (IMS-2012), St. Petersburg, Russia: Nat. ex. un-t inform. technology, mechanics and optics, pp. 348-354, http://ojs.ifmo.ru/index.php/IMS/article/download/132/132 (in Russian).
-
Kuznetsov, A.A. and Kovalenko, O.Yu., (2015) Steganographic information protection using 3D printing. Information security of the state, society and personality, Tez Vseukr. Science.-Pract. Conf., Kirovograd City: KNTU, pp. 91-92, (in Russian).
-
Hassan Khan, Mobin Javed, Syed Ali Khayam, and Fauzan Mirza, (2011), Designing a cluster-based covert channel to evade disk investigation and forensics, Computers & Security, 30(1).
-
Hassan Khan, Mobin Javed, Fauzan Mirza, Evading Disk Investigation and Forensics using a Cluster- Based Covert Channel, National University of Science & Technology (NUST), Islamabad 44000, Pakistan.
-
Nerijus Morkevicius, Grigas Petraitis, Algimantas Venckauskas, and Jonas Ceponis, (2013), Covert Channel for Cluster-based File Systems Using Multiple Cover Files, Information Technology and Control, 42(3), p 32.
-
Kuznetsov, A.A., Schwager, A.S., and Fesenko, D.A., (2015) Data hiding in cluster file systems, Radiotechnika, 181, pp. 86-100, (in Russian).
-
Krasnobayev Victor, Koshman Sergey, Myslyvtsev Kostiantyn, Kuznetsova Kateryna, Ivko Tetiana, Katkova Tetiana, Method of Arithmetic Comparison of Data in the Residue Numeral System, 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019. Crossref
-
Krasnobaev Victor, Dyachenko Andrey, Kuznetsova Tetiana, Panchenko Volodymir, Ulianovska Yuliia, Methods for Monitoring and Diagnosing Data in the Residue Class, 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), 2019. Crossref
-
Lutsenko Mariia, Kuznetsov Alexandr, Gorbenko Yurii, Oleshko Inna, Pronchakov Yurii, Kotukh Yevgen, Key Generation from Biometric Data of Iris, 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), 2019. Crossref