While traditionially we seek undetectable embedding, steganographic file systems are designed to achieve a weaker goal of plausible deniability. The first two problems are somewhat addressed in the literature by amending the goals of the data hiding. This portability issue can be improved by concealing data within copyable files rather than disk blocks, and by accessing data with an application-level program rather than a driver. A steganographic file system already on a removable drive may not be accessible on an arbitrary computer, if a file system driver must be installed to read it. The portability problem: a steganographic file system embedded in unused disk blocks is not easily copied to a removable drive.5 Once this system is running, any leakage of information will hopefully be confined to the steganographic volume. TrueCrypt now allows the hiding of a bootable operating system volume, which can be extracted by a special boot loader, in response to potential leakage attacks. A solution to this problem is to replace a steganographic file system with a steganographic operating system. Applications which open hidden files may inadvertently save or cache a copy, an operating system may swap memory to disk, and users may remove files from the system in order to work with them.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |