Hiding data in the file structure
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 1, Issue 9
Abstract
In this paper, the methods of steganography hiding of information in a file system structure is investigated. Namely, the structure of the FAT file system (File Allocation Table) and methods of hiding information messages, which are based on repositioning separate clusters of cover files. A new method is proposed that, unlike the known ones, changes the order of alternation of clusters in each cover file, which allows to further hide a certain informational message, that is, to increase the capacity of the hidden channel. It was confirmed that the results of the data concealment and deletion procedures largely depend on the number of clusters with which it is necessary to carry out the appropriate transformations. It is noted that the extraction procedure is performed much faster than hiding the message. The proposed method is implemented programmatically, the results of experimental researches confirmed the adequacy of the theoretical conclusions and recommendations.
Authors and Affiliations
A. Kuznetsov, K. Shekhanin, Ye. Demenko
IMPLEMENTING NTRU-similar ALGORITHM ON THE BASIS OF NTRUPrime
The modern attacks uses special structures of the rings in the NTRU similar algorithms. The article was proposed post-quantum parameters NTRUPrime without these structures. Have investigated the possibility of using th...
THE CONCEPT OF PROCESSING INTEGER DATA REPRESENTED IN THE SYSTEM OF RESIDUE CLASSES
The coding of residues number witch submitted the appropriate modules of residual classes system (RCS), made with data from complete system of the smallest non-negative residues (CSSNR) was show in the article. In this a...
PROPOSALS OF COMPARATIVE ANALYSIS AND DECISION MAKING DURING THE COMPETITION REGARDING THE CERTAIN BENEFITS OF ASYMMETRIC POST QUANTUM CRYPTOGRAPHIC PRIMITIVES
The paper considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of system u...
IMPROVED MATHEMATICAL MODEL OF THE POST-QUANTUM ELETRONIC SIGNATURE MECHANISM
In the paper new electronic signature mechanisms which will be urgent in the post-quantum period devel-opment necessity is grounded. The main one time key mechanisms are briefly described. Problems related with Lamport O...
DATA SINGLE-ERROR CORRECTION METHOD OF A RESIDUE CLASS CODE
The method of correction of single errors in the residue class (RC) is considered in this article. The results of analysis of arithmetic code correcting possibilities showed high efficiency of the use of position-indepen...