Investigation of the computational complexity of methods for hiding information in cluster steganosystems
DOI:
https://doi.org/10.30837/rt.2021.3.206.07Keywords:
steganography, methods of hiding information, computational complexity, RAMAbstract
Several methods of technical steganography are currently known. Hiding information in a model in 3D printing, this industry of hiding information has certain advantages and disadvantages, namely: the relatively high cost of creating a hidden message and the difficulty in reading the information. The second area of technical steganography is related to network traffic. In this method, information can be hidden, for example, in the header fields of protocols, or, for example, the transmission of a hidden message by sending packets in a certain sequence. There are also methods of hiding information in the structure of the file system, but the known methods are either capable of hiding a small amount of information, or have an insufficient level of resistance to detection. Thus, an urgent task is to develop a method for hiding information, which is able to hide more information and has a higher level of resistance to detection, with a satisfactory level of computational complexity.
This paper presents methods of technical steganography based on the structural features of file systems in storage media, in particular, hiding information in the FAT file system by mixing clusters of certain key files (cover files). Methods of hiding information in the structure of a clustered file system by mixing clusters of cover files require significant computational resources. In this paper, research has been carried out on methods to increase computational efficiency in terms of the amount of required RAM, and the number of the required number of basic operations to hide a message.
References
Kuznetsov A. and others. Method of 3D-steganography // CS&CS E-journal. 2018. № 4. С. 4–12.
Kuznetsov A. and others. Information Hiding Using 3D-Printing Technology // 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). 2019a. С. 701–706.
Kuznetsov A. A. and others. 3D STEGANOGRAPHY INFORMATION HIDING // TRE. 2019b. Т. 78. № 12.
Mazurczyk W., Szczypiorski K. Steganography of VoIP Streams // arXiv:0805.2938 [cs]. 2008.
Fraczek W., Mazurczyk W., Szczypiorski K. Stream Control Transmission Protocol Steganography // 2010 International Conference on Multimedia Information Networking and Security. 2010. С. 829–834.
Fraczek W., Mazurczyk W., Szczypiorski K. How Hidden Can be Even More Hidden? // 2011 Third International Conference on Multimedia Information Networking and Security, 2011. С. 581–585.
Szczypiorski K. HICCUPS: Hidden communication system for corrupted networks // 2003.
Khan H. and others. Designing a cluster-based covert channel to evade disk investigation and forensics // Computers & Security. 2011. Т. 30. № 1. С. 35–49.
Khan H. and others. Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel // 2012.
Venčkauskas A. and others. Covert Channel for Cluster-based File Systems Using Multiple Cover Files // Information Technology and Control. 2013. Т. 42. № 3. С. 260-267.
Shekhanin K.Yu., Kolhatin A.O., Demenko E.E., Kuznetsov A.A. On hiding data into the structure of the FAT family file systemy. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika): Volume 78, Issue 11, 2019, Pages 973-985. https://www.scopus.com/record/display.uri?eid=2-s2.0-85070406462&origin=inward.
Shekhanin K., Kuznetsov A., Krasnobayev V., Smirnov, O: Detecting hidden information in FAT // International Journal of Computer Network and Information Security: Vol. 12, Issue 3, June 2020. P. 33-43. https://www.scopus.com/record/display.uri?eid=2-s2.0-85086029655&origin=inward
Kuznetsov A., Shekhanin K., Kolhatin, A., Mikheev I., Belozertsev I. Hiding data in the structure of the FAT family file system // Proceedings of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, DESSERT 2018. 9 July 2018, Pages 337-342 https://www.scopus.com/record/display.uri?eid=2-s2.0-85050684345&origin=inward
Shekhanin K., Kolhatin A., Kuznetsova K., Kavun S. Steganographic hiding information in a file system structure // 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics, UkrMiCo 2018 // Proceeding. September 2018, P. 9047551. https://www.scopus.com/record/display.uri?eid=2-s2.0-85083488842&origin=inward
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).