Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

Binary Trees CSC 220. Your Observations (so far data structures) Array –Unordered Add, delete, search –Ordered Linked List –??
Steganography and Network Security
CPSC 231 Organizing Files for Performance (D.H.) 1 LEARNING OBJECTIVES Data compression. Reclaiming space in files. Compaction. Searching. Sorting, Keysorting.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Overview of Digital Stenography
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
1 Friday, July 07, 2006 “Vision without action is a daydream, Action without a vision is a nightmare.” - Japanese Proverb.
Tirgul 6 B-Trees – Another kind of balanced trees Problem set 1 - some solutions.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Database Management Systems, R. Ramakrishnan and J. Gehrke1 Tree-Structured Indexes Chapter 9.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
Configuring File Services Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Configuring a File ServerConfigure a file server4.1 Using.
Digital Watermarking Parag Agarwal
Pemrograman Berbasis WEB XML part 2 -Aurelio Rahmadian- Sumber: w3cschools.com.
Steganography detection Roland Cmorik, Martin Šumák.
Chapter 6 RAID. Chapter 6 — Storage and Other I/O Topics — 2 RAID Redundant Array of Inexpensive (Independent) Disks Use multiple smaller disks (c.f.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
XML introduction to Ahmed I. Deeb Dr. Anwar Mousa  presenter  instructor University Of Palestine-2009.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Data Structures Week 5 Further Data Structures The story so far  We understand the notion of an abstract data type.  Saw some fundamental operations.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Unit 2, cont. September 12 More HTML. Attributes Some tags are modifiable with attributes This changes the way a tag behaves Modifying a tag requires.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Consider the short (and useless) C program off to the right. Each of the variables {a, b, c} references an integer value that occupies some memory at runtime.
Go to your school’s web locker site school name.schoolweblockers.com) Your user name is the first letter of your first name, the first 4.
Chapter 11 Heap. Overview ● The heap is a special type of binary tree. ● It may be used either as a priority queue or as a tool for sorting.
Downloading and Installing Autodesk Revit 2016
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
 To begin you first need to sign up to Weebly by going to or alternatively and we will create an account.
I MPLEMENTING FILES. Contiguous Allocation:  The simplest allocation scheme is to store each file as a contiguous run of disk blocks (a 50-KB file would.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
CompSci Memory Model  For this course: Assume Uniform Access Time  All elements in an array accessible with same time cost  Reality is somewhat.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Text2PTO: Modernizing Patent Application Filing A Proposal for Submitting Text Applications to the USPTO.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Digital Steganography
Answer to Summary Questions
Configuring File Services
COMP261 Lecture 23 B Trees.
Welcome
STEGANOGRAPHY.
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Create your Benner - intro
Introduction to Computers
Steganography.
Visit for more Learning Resources
File System Management
Presentation transcript:

Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:

 I listened on a conference to a brief presentation about steganography and just after it presentation of data publicity and accessibility in modern social networks. I came with idea to create steganography file system for storing any kind of information. As I am NOT a SPECIALIST in this area, I only create this presentation and if in the future I will be able to critically analyze it, so it will be tested or implemented or whatever.

 Please, feel free to use this as raw ideas, or plan or whatever. If you find mistakes, write to me; if you like, please, also tell me.

 Steganography is the art and science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. For example, the hidden message may be in invisible ink between the visible lines of a private letter.  (R)Wikipedia

 Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. The hidden image is shown right.  Image of a cat extracted from the tree image above.

 With steganography you can put any kind of message and make carrier public. There are many techniques, but lets focus on pictures. I chose pictures because:  There are lots of pictures  There are lots of new pictures  You can make picture public  It’s hard to detect anomalies that somebody accessing pictures as it’s common  There are techniques for writing on pictures  Pictures are easily got (from the internet), modified and are heavy, i.e. you can put hell a lot of data to them without overloading and making them suspicious.

 Briefly, I suppose that flickr.com is the site that can be used as:  Stores many pictures  You can make picture public  It has API to manipulate with images, especially getting required image  Images has big resolution

 It should be able to carry big files  It should be able to carry several files  It should be able to carry encrypted files (double protection)  It should be accessible anytime (imagine if server with picture fail)

 I am thinking of using Unix file structure to create a list of linked images (shown on picture below). Number of levels depend on the file system size and storage capacity of each picture. Multiple links preserve system from image non loading due to server failure.

 I plan each element to be either node or leaf. Nodes has links to other pictures (nodes or leaves). Nodes store information about ID, list of child IDs and other relevant data. They CANNOT store data themself. Leaves are final elements and they store data. They cannot have links. Nodes can be of any size, but final leaves are preferred to be same to each other. Number of links to same element is determined by how often is node inaccessible. I think of 3-4.

 As our final goal is getting leaves, we need first to get all nodes, find ID’s of all leaves and get all leaves that can be accessible. (Though it is possible only to get required leaves and stop loop). If the element is missing, so it is left non filled.

 The solution to make file system accessible even if it’s elements fail (e.g. deleted) is RAID. Let’s assume RAID 15 (RAID 5 on mirrors) where pictures act as drives. As mirroring requires “same drives”, so we will need similar pictures.  You can build mirror on more than 2 pictures to increase fault tolerance

 The space of RAID 5 array can be used as it is, or some extra data encryption can be added. Space is used as fix array of char. Additional file system can be organized inside to store folders and files with parameters, extensions, access rights

 If pictures from the internet are used, so simple comparison of original and new picture will show difference. To eliminate this, some new pictures are needed.  There are no possibilities of writing, only updating images or creating new one.  Do not forget about possibility of tracking due to camera matrix unique characteristics. Search web for this research.  Do not forget IP or other tracking by web server itself.

 Writing  Reading