Share Email Print

Proceedings Paper

Design of a steganographic virtual operating system
Author(s): Elan Ashendorf; Scott Craver
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

A steganographic file system is a secure file system whose very existence on a disk is concealed. Customarily, these systems hide an encrypted volume within unused disk blocks, slack space, or atop conventional encrypted volumes. These file systems are far from undetectable, however: aside from their ciphertext footprint, they require a software or driver installation whose presence can attract attention and then targeted surveillance. We describe a new steganographic operating environment that requires no visible software installation, launching instead from a concealed bootstrap program that can be extracted and invoked with a chain of common Unix commands. Our system conceals its payload within innocuous files that typically contain high-entropy data, producing a footprint that is far less conspicuous than existing methods. The system uses a local web server to provide a file system, user interface and applications through a web architecture.

Paper Details

Date Published: 4 March 2015
PDF: 10 pages
Proc. SPIE 9409, Media Watermarking, Security, and Forensics 2015, 94090G (4 March 2015); doi: 10.1117/12.2079875
Show Author Affiliations
Elan Ashendorf, Binghamton Univ. (United States)
Scott Craver, Binghamton Univ. (United States)

Published in SPIE Proceedings Vol. 9409:
Media Watermarking, Security, and Forensics 2015
Adnan M. Alattar; Nasir D. Memon; Chad D. Heitzenrater, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?