Investigation of the computational complexity of methods for hiding information in cluster steganosystems

Authors

DOI:

https://doi.org/10.30837/rt.2021.3.206.07

Keywords:

steganography, methods of hiding information, computational complexity, RAM

Abstract

Several methods of technical steganography are currently known. Hiding information in a model in 3D printing, this industry of hiding information has certain advantages and disadvantages, namely: the relatively high cost of creating a hidden message and the difficulty in reading the information. The second area of technical steganography is related to network traffic. In this method, information can be hidden, for example, in the header fields of protocols, or, for example, the transmission of a hidden message by sending packets in a certain sequence. There are also methods of hiding information in the structure of the file system, but the known methods are either capable of hiding a small amount of information, or have an insufficient level of resistance to detection. Thus, an urgent task is to develop a method for hiding information, which is able to hide more information and has a higher level of resistance to detection, with a satisfactory level of computational complexity.

This paper presents methods of technical steganography based on the structural features of file systems in storage media, in particular, hiding information in the FAT file system by mixing clusters of certain key files (cover files). Methods of hiding information in the structure of a clustered file system by mixing clusters of cover files require significant computational resources. In this paper, research has been carried out on methods to increase computational efficiency in terms of the amount of required RAM, and the number of the required number of basic operations to hide a message.

References

Kuznetsov A. and others. Method of 3D-steganography // CS&CS E-journal. 2018. № 4. С. 4–12.

Kuznetsov A. and others. Information Hiding Using 3D-Printing Technology // 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). 2019a. С. 701–706.

Kuznetsov A. A. and others. 3D STEGANOGRAPHY INFORMATION HIDING // TRE. 2019b. Т. 78. № 12.

Mazurczyk W., Szczypiorski K. Steganography of VoIP Streams // arXiv:0805.2938 [cs]. 2008.

Fraczek W., Mazurczyk W., Szczypiorski K. Stream Control Transmission Protocol Steganography // 2010 International Conference on Multimedia Information Networking and Security. 2010. С. 829–834.

Fraczek W., Mazurczyk W., Szczypiorski K. How Hidden Can be Even More Hidden? // 2011 Third International Conference on Multimedia Information Networking and Security, 2011. С. 581–585.

Szczypiorski K. HICCUPS: Hidden communication system for corrupted networks // 2003.

Khan H. and others. Designing a cluster-based covert channel to evade disk investigation and forensics // Computers & Security. 2011. Т. 30. № 1. С. 35–49.

Khan H. and others. Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel // 2012.

Venčkauskas A. and others. Covert Channel for Cluster-based File Systems Using Multiple Cover Files // Information Technology and Control. 2013. Т. 42. № 3. С. 260-267.

Shekhanin K.Yu., Kolhatin A.O., Demenko E.E., Kuznetsov A.A. On hiding data into the structure of the FAT family file systemy. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika): Volume 78, Issue 11, 2019, Pages 973-985. https://www.scopus.com/record/display.uri?eid=2-s2.0-85070406462&origin=inward.

Shekhanin K., Kuznetsov A., Krasnobayev V., Smirnov, O: Detecting hidden information in FAT // International Journal of Computer Network and Information Security: Vol. 12, Issue 3, June 2020. P. 33-43. https://www.scopus.com/record/display.uri?eid=2-s2.0-85086029655&origin=inward

Kuznetsov A., Shekhanin K., Kolhatin, A., Mikheev I., Belozertsev I. Hiding data in the structure of the FAT family file system // Proceedings of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, DESSERT 2018. 9 July 2018, Pages 337-342 https://www.scopus.com/record/display.uri?eid=2-s2.0-85050684345&origin=inward

Shekhanin K., Kolhatin A., Kuznetsova K., Kavun S. Steganographic hiding information in a file system structure // 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics, UkrMiCo 2018 // Proceeding. September 2018, P. 9047551. https://www.scopus.com/record/display.uri?eid=2-s2.0-85083488842&origin=inward

Published

2021-09-24

How to Cite

Shekhanin, K. ., Pshenichnaya, S., & Kuznetsov, A. . (2021). Investigation of the computational complexity of methods for hiding information in cluster steganosystems. Radiotekhnika, 3(206), 77–87. https://doi.org/10.30837/rt.2021.3.206.07

Issue

Section

Articles