Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,537 papers from all fields of science
Search
Sign In
Create Free Account
Steganographic file system
Known as:
Steganographic filesystem
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
BPCS-Steganography
Computer file
Disk partitioning
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB
Khalid A. Darabkh
Information Technology and Control
2017
Corpus ID: 335050
Steganographic techniques can be utilized to conceal data within digital images with small or invisible changes in the perceived…
Expand
2010
2010
A multi-user steganographic file system on untrusted shared storage
Jin Han
,
Meng Pan
,
Debin Gao
,
HweeHwa Pang
Asia-Pacific Computer Systems Architecture…
2010
Corpus ID: 15034763
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static…
Expand
2008
2008
A Shared Steganographic File System with Error Correction
J. Domingo-Ferrer
,
M. Bras-Amorós
Modeling Decisions for Artificial Intelligence
2008
Corpus ID: 14566791
Steganographic file systems are file systems where the location and even the existence of files are unknown to the users not…
Expand
2007
2007
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System
C. Troncoso
,
Claudia Díaz
,
O. Dunkelman
,
B. Preneel
Information Hiding
2007
Corpus ID: 15736018
A continuously-observable steganographic file system allows to remotely store user files on a raw storage device; the security…
Expand
Highly Cited
2006
Highly Cited
2006
Authenticating Multi-dimensional Query Results in Data Publishing
Weiwei Cheng
,
HweeHwa Pang
,
K. Tan
Database Security
2006
Corpus ID: 12351848
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be…
Expand
2004
2004
Hiding data accesses in steganographic file system
Xuan Zhou
,
HweeHwa Pang
,
K. Tan
Proceedings / International Conference on Data…
2004
Corpus ID: 1130222
To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to…
Expand
Highly Cited
2003
Highly Cited
2003
StegFS: a steganographic file system
HweeHwa Pang
,
K. Tan
,
Xuan Zhou
Proceedings / International Conference on Data…
2003
Corpus ID: 15452752
While user access control and encryption can protect valuable data from passive observers, those techniques leave visible…
Expand
2003
2003
GBDE-GEOM Based Disk Encryption
Poul-Henning Kamp
USENIX Conference on the BSD operating system
2003
Corpus ID: 17472515
The ever increasing mobility of computers has made protection of data on digital storage media an important requirement in a…
Expand
Highly Cited
1999
Highly Cited
1999
StegFS: A Steganographic File System for Linux
A. McDonald
,
M. Kuhn
Information Hiding
1999
Corpus ID: 8482879
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release…
Expand
Highly Cited
1998
Highly Cited
1998
The Steganographic File System
Ross J. Anderson
,
R. Needham
,
A. Shamir
Information Hiding
1998
Corpus ID: 15032000
Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE