StegFS: a steganographic file system

@article{Pang2003StegFSAS,
  title={StegFS: a steganographic file system},
  author={HweeHwa Pang and K. Tan and X. Zhou},
  journal={Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)},
  year={2003},
  pages={657-667}
}
  • HweeHwa Pang, K. Tan, X. Zhou
  • Published 2003
  • Computer Science
  • Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)
While user access control and encryption can protect valuable data from passive observers, those techniques leave visible ciphertexts that are likely to alert an active adversary to the existence of the data, who can then compel an authorized user to disclose it. We introduce StegFS, a steganographic file system that aims to overcome that weakness by offering plausible deniability to owners of protected files. StegFS securely hides user-selected files in a file system so that, without the… Expand
68 Citations
Steganographic schemes for file system and B-tree
  • 32
  • PDF
DEFY: A Deniable, Encrypted File System for Log-Structured Storage
  • 27
  • PDF
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System
  • 15
  • Highly Influenced
  • PDF
INFUSE: Invisible plausibly-deniable file system for NAND flash
  • PDF
Artifice: A Deniable Steganographic File System
  • 1
  • PDF
Hiding data accesses in steganographic file system
  • 30
  • PDF
A Survey of State of the Art techniques of
  • 2
Steganographic information hiding that exploits a novel file system vulnerability
  • 4
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 22 REFERENCES
StegFS: A Steganographic File System for Linux
  • 141
  • PDF
Exploring steganography: Seeing the unseen
  • 1,236
  • PDF
The Steganographic File System
  • 182
  • PDF
Mnemosyne: Peer-to-Peer Steganographic Storage
  • 88
  • PDF
The MD5 Message-Digest Algorithm
  • 3,910
  • PDF
The Prisoners' Problem and the Subliminal Channel
  • 971
BestPeer: a self-configurable peer-to-peer system
  • W. Ng, B. Ooi, K. Tan
  • Computer Science
  • Proceedings 18th International Conference on Data Engineering
  • 2002
  • 84
  • PDF
Efficient dispersal of information for security, load balancing, and fault tolerance
  • M. Rabin
  • Mathematics, Computer Science
  • JACM
  • 1989
  • 1,473
  • Highly Influential
  • PDF
...
1
2
3
...