Steganographic File System Based on Jpeg Files 1
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Stackable File Systems As a Security Tool
Stackable File Systems as a Security Tool Erez Zadok Computer Science Department, Columbia University [email protected] CUCS-036-99 Abstract Programmers often prefer to use existing system security services, such as file system security, rather than im- plement their own in an application. Traditional Unix security is generally considered inadequate and few operating systems offer enhanced security features such as ACLs[24] or immutable files[12]. Additional file system security features are always sought, but implementing them is a difficult task because modifying and porting existing file systems is costly or not possible. We advocate adding new security features using stackable file systems. As a starting point, we propose a portable, stackable template called the wrapper file system or Wrapfs, a minimal file system from which a wide range of file systems can be prototyped. A developer can modify a copy of the template and add only that which is necessary to achieve the desired functionality. The Wrapfs template takes care of kernel internals, freeing the developer from the details of operating system internals. Wrapfs imposes an overhead of only 5–7%. This paper describes the design, implementation, and porting of Wrapfs. We discuss several prototype file sys- tems written using Wrapfs that illustrate the ease with which security features can be implemented. The examples demonstrate security features such as encryption, access control, intrusion detection, intrusion avoidance, and analy- sis. 1 Introduction Security has become and integral part of computing in recent years. To provide the strongest possible security to users, security solutions sometimes consume a large amount of resources, and may inconvenience their users too much. -
A Steganographic File System for the Linux Kernel
A Steganographic File System for the Linux Kernel by Ashley Morgan Anderson The University of Exeter COM3401 Individual Project 11th August 2007 Abstract Encryption is all around us these days, yet the security of private data on home computers is overlooked by many. The presence of cipher-text — in some instances — can make things worse, therefore the only way to overcome this is to hide the data. The Ancient Greeks knew about this risk and as such fabricated some of the most ingenious methods of steganography ever used. However, steganography has come along way in the last 3000 years, and is more important today than ever before (due to tightening restrictions governing encryption). This paper looks at how different mediums have been used to ensure messages and data remain private, as well as proposing a new file system which takes care of hiding files for the user. Whilst not the first, it does include many unique features which are intended to provide a more natural interface. I certify that all material in this project which is not my own work has been identified. ...................................... A.M. Anderson Contents 1 Introduction 1 2 Background 2 2.1 Steganography . 2 2.2 File Systems . 4 2.3 Steganographic File Systems . 6 3 Design 11 3.1 Implemented Design . 11 3.2 Potential Driver Types . 13 3.3 Initial File System . 15 3.4 Encryption . 15 3.5 A Discarded Design . 16 4 Development 17 4.1 The Tools . 17 4.2 The Process . 18 5 Testing 19 5.1 Progressive . 19 5.2 Forensic Analysis . -
Openpuff Steganography & Watermarking
OPENPUFF V4.01 STEGANOGRAPHY & WATERMARKING Data hiding and watermarking made easy, safe and free EmbeddedSW © 2018 Send your suggestions, comments, bug reports, requests to [email protected] – Skype "embeddedsw.company" OPENPUFF HOMEPAGE LEGAL REMARKS P. 2 OPENPUFF INSTALLATION: WINDOWS P. 3 OPENPUFF INSTALLATION: LINUX P. 4 FEATURES: WHY IS THIS STEGANOGRAPHY TOOL DIFFERENT FROM THE OTHERS? P. 7 FEATURES: PROGRAM ARCHITECTURE P. 9 FEATURES: ADAPTIVE ENCODING AND STEGANALYSIS RESISTANCE P. 13 FEATURES: MULTI-CRYPTOGRAPHY & DATA OBFUSCATION P. 14 WHAT IS STEGANOGRAPHY? P. 15 WHAT IS DENIABLE STEGANOGRAPHY? P. 16 WHAT IS MARKING? P. 18 SUPPORTED FORMATS IN DETAIL P. 19 SUGGESTIONS FOR BETTER RESULTS P. 24 OPTIONS: BITS SELECTION LEVEL P. 26 STEP BY STEP DATA HIDING P. 27 STEP BY STEP DATA UNHIDING P. 31 STEP BY STEP MARK SETTING P. 34 STEP BY STEP MARK CHECKING P. 35 STEP BY STEP DATA & MARK ERASING P. 36 OPENPUFF V4.01 - ENGLISH - 11/JUL/2018 1 LEGAL REMARKS Remember: this program was not written for illegal use. Usage of this program that may violate your country's laws is severely forbidden. The author declines all responsibilities for improper use of this program. No patented code or format has been added to this program. THIS IS A FREE SOFTWARE: This software is released under LGPL 3.0 You’re free to copy, distribute, remix and make commercial use of this software under the following conditions: You have to cite the author (and copyright owner): WWW.EMBEDDEDSW.NET You have to provide a link to the author’s Homepage: WWW.EMBEDDEDSW.NET/OPENPUFF.HTML -
Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P
Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P. Wright, Jay Dave, and Erez Zadok Stony Brook University Appears in the proceedings of the 2003 IEEE Security In Storage Workshop (SISW 2003) Abstract interact with disks, caches, and a variety of other com- plex system components — all having a dramatic effect Securing data is more important than ever, yet cryp- on performance. tographic file systems still have not received wide use. In this paper we perform a real world performance One barrier to the adoption of cryptographic file systems comparison between several systems that are used is that the performance impact is assumed to be too high, to secure file systems on laptops, workstations, and but in fact is largely unknown. In this paper we first moderately-sized file servers. We also emphasize multi- survey available cryptographic file systems. Second, programming workloads, which are not often inves- we perform a performance comparison of a representa- tigated. Multi-programmed workloads are becoming tive set of the systems, emphasizing multiprogrammed more important even for single user machines, in which workloads. Third, we discuss interesting and counterin- Windowing systems are often used to run multiple appli- tuitive results. We show the overhead of cryptographic cations concurrently. We expect cryptographic file sys- file systems can be minimal for many real-world work- tems to become a commodity component of future oper- loads, and suggest potential improvements to existing ating systems. systems. We have observed not only general trends with We present results from a variety of benchmarks, an- each of the cryptographic file systems we compared but alyzing the behavior of file systems for metadata op- also anomalies based on complex interactions with the erations, raw I/O operations, and combined with CPU operating system, disks, CPUs, and ciphers. -
An Approach for Stego-Insider Detection Based on a Hybrid Nosql Database †
Journal of Sensor and Actuator Networks Article An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database † Igor Kotenko 1,* , Andrey Krasov 2 , Igor Ushakov 2 and Konstantin Izrailov 1,2 1 St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 St. Petersburg, Russia; [email protected] 2 Department of Secured Communication Systems, The Bonch-Bruevich State University of Telecommunications, 199178 St. Petersburg, Russia; [email protected] (A.K.); [email protected] (I.U.) * Correspondence: [email protected] † This paper is an extended version of the conference paper: Igor Kotenko, Andrey Krasov, Igor Ushakov and Konstantin Izrailov. Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model. The 4th International Conference on Future Networks and Distributed Systems (ICFNDS 2020). Saint-Petersburg, Russia, 26–27 November 2020. Abstract: One of the reasons for the implementation of information security threats in organizations is the insider activity of its employees. There is a big challenge to detect stego-insiders-employees who create stego-channels to secretly receive malicious information and transfer confidential information across the organization’s perimeter. Especially presently, with great popularity of wireless sensor networks (WSNs) and Internet of Things (IoT) devices, there is a big variety of information that could be gathered and processed by stego-insiders. Consequently, the problem arises of identifying such intruders and their transmission channels. The paper proposes an approach to solving this Citation: Kotenko, I.; Krasov, A.; problem. The paper provides a review of the related works in terms of insider models and methods Ushakov I.; Izrailov K. -
Hello Marte OS Using an Emulator Daniel Sangorrin [email protected]
Hello MaRTE OS using an emulator Daniel Sangorrin [email protected] 2009-3-4 Revision History Revision 1.3 2009-3-4 Revised by: dsl Add mtools for mounting the images. Update installation instructions referencing INSTALL file. Revision 1.2 2007-6-15 Revised by: dsl Added the process to create a FAT16 image file for QEMU Revision 1.1 2007-6-9 Revised by: dsl Updated to MaRTE OS v1.6 snapshot This document tries to introduce people to MaRTE OS in a very simple way. Table of Contents 1. Preface........................................................................................................................................................................2 1.1. Feedback.........................................................................................................................................................2 2. Let’s see MaRTE OS running!.................................................................................................................................2 2.1. Install the emulator QEMU............................................................................................................................2 2.2. ...and run these MaRTE OS Demos! ..............................................................................................................2 3. Hello MaRTE! ...........................................................................................................................................................3 3.1. The compiler GNAT-GPL ..............................................................................................................................3 -
Linux Based Live CD on Optical Disks
Pobrane z czasopisma Annales AI- Informatica http://ai.annales.umcs.pl Data: 26/09/2021 15:23:08 Annales UMCS Annales UMCS Informatica AI 5 (2006) 29-36 Informatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Linux based Live CD on optical disks 1 2* Michał Chromiak , Andrzej Góźdź 1Institute of Mathematics, Maria Curie-Skłodowska University, Pl. M.Curie-Skłodowskiej 1, 20-031 Lublin, Poland 2Institute of Physics, Maria Curie-Skłodowska University, Pl. M.Curie-Skłodowskiej 1, 20-031 Lublin, Poland Abstract We present an introduction to LiveCD system remastering based on a prospective UnionFS filesystem. 1. Introduction Regarding increasing popularity of the LiveCD distributions1 of a Linux system we compile the essential knowledge of how the LiveCD works (based on many rather scattered documents [1-8]) to facilitate preparation of the specialized distributions of systems based on this idea. We describe one of the most efficient ways of system architecture managing using UnionFS. All steps of the procedure were tested using laptops which have often more exotic hardware than desktopUMCS computers. The possibility of booting a PC from a CD/DVD ROM has raised several possibilities, including the most important one, namely, the possibility of running the required system or programs independently of the actual operational system, configuration, and resources of the PC. The self-configuring CD/DVD ROMs can be also useful for administrative purposes and as the rescue disks. The LiveCD distributions allow for cheap and effective use of the PCs as the special servers, routers and other active elements over the network. This idea of the LiveCD systems is based on the possibility opened by the El Torito extension to the standard ISO 9660 system and the Linux kernel capabilities. -
Openpuff Steganography & Watermarking
OPENPUFF V4.01 STEGANOGRAFIA & WATERMARKING Nascondere dati e marking, semplice, sicuro e gratuito EmbeddedSW © 2018 Inviate i vostri suggerimenti, commenti, segnalazioni, richieste a [email protected] – Skype "embeddedsw.company" OPENPUFF HOMEPAGE NOTE LEGALI P. 2 INSTALLARE OPENPUFF: WINDOWS P. 3 INSTALLARE OPENPUFF: LINUX P. 4 CARATTERISTICHE: PERCHÈ QUESTO PROGRAMMA STEGANOGRAFICO È DIFFERENTE DAGLI ALTRI? P. 7 CARATTERISTICHE: ARCHITETTURA DEL PROGRAMMA P. 9 CARATTERISTICHE: CODIFICA ADATTIVA E RESISTENZA ALLA STEGANALISI P. 13 CARATTERISTICHE: MULTI CRITTOGRAFIA E OFFUSCAMENTO DATI P. 14 COSA È LA STEGANOGRAFIA? P. 15 COSA È LA STEGANOGRAFIA NEGABILE? P. 16 COSA È IL MARKING? P. 18 FORMATI SUPPORTATI IN DETTAGLIO P. 19 SUGGERIMENTI PER RISULTATI MIGLIORI P. 24 OPZIONI: LIVELLO DI SELEZIONE BIT P. 26 DATA HIDING IN DETTAGLIO P. 27 DATA UNHIDING IN DETTAGLIO P. 31 MARK SETTING IN DETTAGLIO P. 34 MARK CHECKING IN DETTAGLIO P. 35 DATA & MARK ERASING IN DETTAGLIO P. 36 OPENPUFF V4.01 - ITALIANO - 11/JUL/2018 1 NOTE LEGALI Ricordate: questo programma non è stato scritto per uso illegale. L’uso di questo programma in violazione delle leggi del vostro paese è assolutamente proibito. L’autore declina qualsiasi responsabilità conseguente dall’uso improprio di questo programma. Né codice né formati coperti da brevetto sono stati inseriti in questo programma. QUESTO È UN FREE SOFTWARE: Questo software è rilasciato con licenza LGPL 3.0 Siete liberi di copiare, distribuire, modificare e fare uso commerciale di questo software alle seguenti -
Authentication of MP4 File by Perceptual Hash and Data Hiding, Pp. 304-314
Authentication of MP4 File by Perceptual Hash and Data Hiding, pp. 304-314 AUTHENTICATION OF MP4 FILE BY PERCEPTUAL HASH AND DATA HIDING April Pyone Maung Maung1, Yiqi Tew2, and KokSheik Wong3 1Faculty of Computer Science & Information Technology, University of Malaya, Malaysia 2Faculty of Computing and Information Technology, Tunku Abdul Rahman University College, Malaysia 3School of Information Technology, Monash University Malaysia, Malaysia Email: [email protected]* (corresponding author), [email protected]* (corresponding author), [email protected] DOI: https://doi.org/10.22452/mjcs.vol32no4.4 ABSTRACT With advances in multimedia signal processing and abundance of data, multimedia authentication becomes more and more challenging and demanding. Although many prior techniques were put forward to authenticate individual video or audio stream, the cross-layer authentication of audio-visual content as a whole remains unexplored. In this work, an authentication system of the dominant audio-visual content file format (MP4) is presented. Specifically, the perceptual hashes of I-frames from video stream are encrypted and embedded into the audio stream, and the audio hash vector is encrypted and embedded in the synchronization information, i.e., stts box, in the MP4 file. The proposed system is implemented and tested on various videos downloaded from YouTube. Results show that the proposed system can authenticate MP4 files correctly without degrading the video quality while being able to provide indication of tampering. Keywords: MP4, Perceptual Hash, Data Hiding, Authentication 1.0 INTRODUCTION Multimedia authentication is the process of confirming the genuineness of a content and its alleged source. It is vital and critical for many applications, especially those involving legal issues. -
An Examination on Information Hiding Tools for Steganography
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE İ. Karadoğan, R. Daş, Vol. 3, No.3 An Examination on Information Hiding Tools for Steganography İsmail Karadoğan*, Resul Daş** *Kahramanmaraş Sütçü İmam Univ., Elbistan Vocational School, Department of Computer Technologies, Kahramanmaraş, Turkey. e-mail: [email protected] **Fırat University, Technology Faculty, Department of Software Engineering, Elazığ, Turkey. e-mail: [email protected] Abstract— In this paper, information about the steganographic methods and tools that are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as used methods, types of hidden data and cover media are examined. Keywords- Information security; information hiding; steganography; steganography tools. 1. Introduction Since the dawn of written communication people have been concerned with both obscuring the contents of communication (Cryptography) and obscuring the fact that communication is taking place (Steganography). As a result of the digitization of communication, new stegonagraphic approaches, protocols and Figure 1. The data hiding diagram as a simple form applications have been developed. Conforming to the principle of ‘Defense in Steganography is the art and science of hiding Depth’ it is standard practice to employ secret messages or information within innocent cryptography, compression, and steganography looking media. Because the sender and intended when hiding data. Even if the existence of covert recipient want to communicate securely, the communication can be determined by unwanted carrier medium in which the hidden message is third parties, the encoding or the obfuscation of embedded should not arouse the suspicion of third data complicates the retrieval of data, typically parties’ concerning the existence of the hidden requiring access to keys. -
The DENX U-Boot and Linux Guide (DULG) for M28evk
The DENX U-Boot and Linux Guide (DULG) for m28evk Table of contents: • 1. Abstract • 2. Introduction ♦ 2.1. Copyright ♦ 2.2. Disclaimer ♦ 2.3. Availability ♦ 2.4. Credits ♦ 2.5. Translations ♦ 2.6. Feedback ♦ 2.7. Conventions • 3. Embedded Linux Development Kit ♦ 3.1. ELDK Availability ♦ 3.2. ELDK Getting Help ♦ 3.3. Supported Host Systems ♦ 3.4. Supported Target Architectures ♦ 3.5. Installation ◊ 3.5.1. Product Packaging ◊ 3.5.2. Downloading the ELDK ◊ 3.5.3. Initial Installation ◊ 3.5.4. Installation and Removal of Individual Packages ◊ 3.5.5. Removal of the Entire Installation ♦ 3.6. Working with ELDK ◊ 3.6.1. Switching Between Multiple Installations ♦ 3.7. Mounting Target Components via NFS ♦ 3.8. Rebuilding ELDK Components ◊ 3.8.1. ELDK Source Distribution ◊ 3.8.2. Rebuilding Target Packages ◊ 3.8.3. Rebuilding ELDT Packages ♦ 3.9. ELDK Packages ◊ 3.9.1. List of ELDT Packages ◊ 3.9.2. List of Target Packages ♦ 3.10. Rebuilding the ELDK from Scratch ◊ 3.10.1. ELDK Build Process Overview ◊ 3.10.2. Setting Up ELDK Build Environment ◊ 3.10.3. build.sh Usage ◊ 3.10.4. Format of the cpkgs.lst and tpkgs.lst Files • 4. System Setup ♦ 4.1. Serial Console Access ♦ 4.2. Configuring the "cu" command ♦ 4.3. Configuring the "kermit" command ♦ 4.4. Using the "minicom" program ♦ 4.5. Permission Denied Problems ♦ 4.6. Configuration of a TFTP Server ♦ 4.7. Configuration of a BOOTP / DHCP Server ♦ 4.8. Configuring a NFS Server • 5. Das U-Boot ♦ 5.1. Current Versions ♦ 5.2. -
Identification of LSB Image Steganography Using Cover Image Comparisons
Journal of Digital Forensics, Security and Law Volume 15 Article 6 February 2021 Identification of LSB image Steganography using Cover Image Comparisons Michael Pelosi Texas A&M University — Texarkana, [email protected] Chuck Easttom Independent Forensic Expert, [email protected] Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Law Commons, and the Information Security Commons Recommended Citation Pelosi, Michael and Easttom, Chuck (2021) "Identification of LSB image Steganography using Cover Image Comparisons," Journal of Digital Forensics, Security and Law: Vol. 15 , Article 6. DOI: https://doi.org/10.15394/jdfsl.2021.1551 Available at: https://commons.erau.edu/jdfsl/vol15/iss2/6 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Journal of Digital Forensics, Security and Law POSITIVE IDENTIFICATION OF LEAST SIGNIFICANT BIT (LSB)1 IMAGE STEGANOGRAPHY USING COVER IMAGE COMPARISONS ABSTRACT Steganography has long been used to counter forensic investigation. This use of steganography as an anti- forensics technique is becoming more widespread. This requires forensic examiners to have additional tools to more effectively detect steganography. In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of least significant bit (LSB) image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image.