Abstract
Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability. However, existing plausible deniability mechanisms, such as the one-time pad, are of rather limited scope.
In this paper, we present the steganographic file system. This is a storage mechanism designed to give the user a very high level of protection against being compelled to disclose its contents. It will deliver a file to any user who knows its name and password; but an attacker who does not possess this information and cannot guess it, can gain no information about whether the file is present, even given complete access to all the hardware and software. We provide two independent constructions, which make slightly different assumptions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
“Measuring the Diversity of Random Number Generators”, R Anderson, R Gibbens, C Jagger, F Kelly, M Roe, preprint, 1992
“Stretching the Limits of Steganography”, RJ Anderson, in [3] pp 39–48
‘Information Hiding’, May 30–June 1 1996; proceedings published by Springer as Lecture Notes in Computer Science vol 1174
“Tamper Resistance-a Cautionary Note”, RJ Anderson, MG Kuhn, in Proceedings of the Second Usenix Workshop on Electronic Commerce (Nov 96) pp 1–11
‘Plausible Deniability’, DR Beaver, Pragocrypt 96 pp 272–288
“Plug and Play Encryption”, DR Beaver, in Advances in Cryptology-Crypto 97, Springer LNCS v 1294 pp 75–89
“Can invisible watermark resolve rightful ownerships?”, S Craver, N Memon, BL Yeo, MM Yeung, Fifth Conference on Storage and Retrieval for Image and Video Database, 13–14 February 1997, San Jose, CA; SPIE vol 3022 pp 310–321
“Attacks on Copyright Marking Systems”, FAP Petitcolas, RJ Anderson, MG Kuhn, in these proceedings; this paper is also available online at http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/
‘Request for Proposals-Embedded Signalling Systems’, June 97, International Federation of the Phonographic Industry, 54 Regent Street, London W1R 5PJ
“File Organisation: Implementation of a Method Guaranteeing Retrieval in One Access”, P å Larson, A Kajla, in Communications of the ACM v 27 no 7 (July 1984) pp 670–677
‘Cryptography and Evidence’, M Roe, Cambridge University (PhD Thesis, 1997)
“Developer tortured by raiders with crowbars”, M Weaver, Daily Telegraph, 31 October 97
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, R., Needham, R., Shamir, A. (1998). The Steganographic File System. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_6
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive