Study of storage devices properties for steganographic data hiding in cluster file systems
DOI:
https://doi.org/10.30837/rt.2020.4.203.10Keywords:
File storage media, fragmentation, speed of access, data hiding, steganographicAbstract
Methods for technical steganography have been developed in recent years. Hiding of information in such systems is achieved by using properties artificially created by human while constructing various technical means. An example of technical steganography is the application of the features of constructing clustered file systems. This makes it possible to hide information effectively by changing the alternation of individual clusters, the so-called сover files. The names of such files are the key information and it is extremely difficult to recover a hidden message without links (i.e. without names) of cover files. This work describes and analyzes various modern information storage technologies, namely HDD, Flash-USB, SSD. We have analyzed different indicators such as the number of implemented products, price, speed of reading and writing. The important indicators of storage media efficiency with regard to steganographic methods of hiding information in cluster file systems were also analyzed. For example, we have investigated the speed of sequential reading / writing and the speed of access to a random cluster that is similar to the speed of access to a fragmented file. For this, we used the test results from the UserBenchmark resource. Tests were performed using Sequential and Random4k methods. In conclusion, an assessment of information carriers is given and recommendations are given on using the method of hiding data by mixing clusters in the structure of the file system.
References
Klima R.E., Klima R., Sigmon N.P., Sigmon N., Klima R., Sigmon N.P., Sigmon N. Cryptology: Classical and Modern. Chapman and Hall/CRC (2018). https://doi.org/10.1201/9781315170664.
Delfs H., Knebl H. Introduction to Cryptography. Springer Berlin Heidelberg. Berlin, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47974-2.
Childs L.N. Cryptology and Error Correction: An Algebraic Introduction and Real-World Applications. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-030-15453-0.
Manoj I.V.S. Cryptography and Steganography // IJCA. 1, 63–68 (2010). https://doi.org/10.5120/257-414.
Yahya A. Introduction to Steganography // Yahya A. (ed.) Steganography Techniques for Digital Images. pp. 1–7. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-319-78597-4_1.
Qin J., Luo Y., Xiang X., Tan Y., Huang H.: Coverless Image Steganography: A Survey // IEEE Access. 7, 171372–171394 (2019). https://doi.org/10.1109/ACCESS.2019.2955452.
Schöttle P., Böhme R. Game Theory and Adaptive Steganography. IEEE Transactions on Information Forensics and Security. 11, 760–773 (2016). https://doi.org/10.1109/TIFS.2015.2509941.
Yahya A. Steganography Techniques // Yahya, A. (ed.) Steganography Techniques for Digital Images. pp. 9–42. Springer International Publishing, Cham (2019). https://doi.org/10.1007/978-3-319-78597-4_2.
Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge; New York (2009).
Cox I., Miller M., Bloom J., Fridrich J., Kalker T. Digital Watermarking and Steganography. 2nd Ed. Morgan Kaufmann, Amsterdam, Boston (2007).
Kim C.R., Lee S.H., Lee J.H., Park J.-I. Blind decoding of image steganography using entropy model // Electronics Letters. 54, 626–628 (2018). https://doi.org/10.1049/el.2017.4276.
Rowland C.H. Covert channels in the TCP/IP protocol suite, https://firstmonday.org/ojs/index.php/fm/article/download/528/449?inline=1, last accessed 2020/11/08.
Mazurczyk W., Lubacz J. LACK – a VoIP steganographic method // Telecommun Syst. 45, 153–163 (2010). https://doi.org/10.1007/s11235-009-9245-y.
Lubacz J., Mazurczyk W., Szczypiorski K. Principles and Overview of Network Steganography // IEEE Communications Magazine. 52, (2012). https://doi.org/10.1109/MCOM.2014.6815916.
Mazurczyk W., Smolarczyk M., Szczypiorski K. On information hiding in retransmissions // Telecommun Syst. 52, 1113–1121 (2013). https://doi.org/10.1007/s11235-011-9617-y.
Cauich E., Gómez Cárdenas R., Watanabe R. Data Hiding in Identification and Offset IP Fields // Ramos, F.F., Larios Rosillo, V., and Unger, H. (eds.) Advanced Distributed Systems. pp. 118–125. Springer, Berlin, Heidelberg (2005). https://doi.org/10.1007/11533962_11.
Wang M., Gu W., Ma C. A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent, https://www.hindawi.com/journals/scn/2020/8848315/, last accessed 2020/11/08. https://doi.org/10.1155/2020/8848315.
Seo J.O., Manoharan S., Mahanti A. Network steganography and steganalysis – a concise review // 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). pp. 368–371 (2016). https://doi.org/10.1109/ICATCCT.2016.7912025.
Noskov A. Analysis of Network Protocols: The Ability of Concealing the Information // Computer and Network Security. (2020). https://doi.org/10.5772/intechopen.88098.
A High Capacity 3D Steganography Algorithm, https://www.computer.org/csdl/journal/tg/2009/02/ttg2009020274/13rRUwdIOUD, last accessed 2020/11/08. https://doi.org/10.1109/TVCG.2008.94.
Paramasivan T., Natarajan V., Gnanasekaran A., Venkatesan V., Anitha R. Pattern based 3D image Ste-ganography. 3D Research. 4, (2014). https://doi.org/10.1007/3DRes.01(2013)1.
Chao M.-W., Lin C., Yu C.-W., Lee T.-Y. A high capacity 3D steganography algorithm // IEEE Trans Vis Comput Graph. 15, 274–284 (2009). https://doi.org/10.1109/TVCG.2008.94.
Li N., Hu J., Sun R., Wang S., Luo Z. A High-Capacity 3D Steganography Algorithm With Adjustable Distortion // IEEE Access. 5, 24457–24466 (2017). https://doi.org/10.1109/ACCESS.2017.2767072.
Thiyagarajan P., Natarajan V., Aghila G., Prasanna Venkatesan V., Anitha R. Pattern based 3D image Steganography. 3D Res. 4, 1 (2014). https://doi.org/10.1007/3DRes.01(2013)1.
Kuznetsov A., Stefanovych O., Gorbenko Y., Smirnov O., Krasnobaev V., Kuznetsova K. Information Hiding Using 3D-Printing Technology // 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). pp. 701–706 (2019). https://doi.org/10.1109/IDAACS.2019.8924352.
Kuznetsov A.A., Stefanovych O.O., Prokopovych-Tkachenko D.I., Kuznetsova K.O. 3D STEGANOGRAPHY INFORMATION HIDING. TRE. 78, (2019). https://doi.org/10.1615/TelecomRadEng.v78.i12.30.
Khan H., Javed M., Mirza F., Khayam S. Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel. (2012).
Khan H., Javed M., Khayam S.A., Mirza F. Designing a cluster-based covert channel to evade disk investigation and forensics. Computers & Security. 30, 35–49 (2011). https://doi.org/10.1016/j.cose.2010.10.005.
Venčkauskas A., Morkevicius N., Petraitis G., Ceponis J. Covert Channel for Cluster-based File Systems Using Multiple Cover Files // Information technology and control. 42, (2013). https://doi.org/10.5755/j01.itc.42.3.3328.
Kuznetsov A., Shekhanin K., Kolhatin A., Mikheev I., Belozertsev I. Hiding data in the structure of the FAT family file system // 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). pp. 337–342 (2018). https://doi.org/10.1109/DESSERT.2018.8409155.
Shekhanin K.Y., Kolhatin A.O., Demenko E.E., Kuznetsov A.A.: ON HIDING DATA INTO THE STRUCTURE OF THE FAT FAMILY FILE SYSTEM. TRE. 78, (2019). https://doi.org/10.1615/TelecomRadEng.v78.i11.50.
Vokorokos L., Madoš B., Ádám N., Baláž A., Porubän J., Chovancová E. Multi-Carrier Steganographic Algorithm Using File Fragmentation of FAT FS. COMPUTING AND INFORMATICS. 38, 343-366–366 (2019).
Shekhanin K., Kuznetsov A., Krasnobayev V., Smirnov O. Detecting Hidden Information // FAT. IJCNIS. 12, 33–43 (2020). https://doi.org/10.5815/ijcnis.2020.03.04.
Aycock J., de Castro D.M.N. Permutation Steganography in FAT Filesystems // Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security X. pp. 92–105. Springer, Berlin, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46739-8_6.
Davis J., MacLean J., Dampier D. Methods of Information Hiding and Detection in File Systems. (2010). https://doi.org/10.1109/SADFE.2010.17.
Neuner S., Voyiatzis A.G., Schmiedecker M., Brunthaler S., Katzenbeisser S., Weippl E.R. Time is on my side: Steganography in filesystem metadata // Digital Investigation. 18, S76–S86 (2016). https://doi.org/10.1016/j.diin.2016.04.010.
FAT File System, https://www.keil.com/pack/doc/mw/FileSystem/html/fat_fs.html, last accessed 2020/11/08.
FAT File Systems. FAT32, FAT16, FAT12 – NTFS.com, https://www.ntfs.com/fat_systems.htm, last ac-cessed 2020/11/08.
Overview of FAT, HPFS, and NTFS File Systems, https://support.microsoft.com/en-us/help/100108/overview-of-fat-hpfs-and-ntfs-file-systems, last accessed 2020/11/08.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).