2013
DOI: 10.2478/tmmp-2013-0036
|View full text |Cite
|
Sign up to set email alerts
|

Steganographic File System Based on Jpeg Files

Abstract: A steganographic system provides a hidden communication channel in background of a public channel. The existence of the hidden channel must remain secret, i.e. the adversary cannot decide whether the public channel contains any covert information or not. The public channel that is used in construction of a steganographic system can often be embedded in a static file (medium), that is called a carrier (if the steganographic information is present). Most of the current research focuses on a single medium. The mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…To name only a few examples, with the rise of computers possibility of the use of secondary storage systems, their changeable media and file systems were examined for the possibility to hide information based on the hardware and software features [8][9] [10]. Another way how to hide information which is connected to the use of computers is the possibility to hide information into pictures stored in JPEG file format [11] [12]. Specific algorithms were created in relation to rise of smartphones and their operating systems including iOS and Android.…”
Section: Introductionmentioning
confidence: 99%
“…To name only a few examples, with the rise of computers possibility of the use of secondary storage systems, their changeable media and file systems were examined for the possibility to hide information based on the hardware and software features [8][9] [10]. Another way how to hide information which is connected to the use of computers is the possibility to hide information into pictures stored in JPEG file format [11] [12]. Specific algorithms were created in relation to rise of smartphones and their operating systems including iOS and Android.…”
Section: Introductionmentioning
confidence: 99%
“…Securing an open platform requires robust security architecture and precisely designed security system. Even though it is possible to provide security at the application level (by means of cryptography or steganography [2], [3]), this does not provide protection against the security leaks at the level of operating system modules. But multi-layer architecture of Android provides necessary flexibility in development and also certain level of protection.…”
Section: Introductionmentioning
confidence: 99%