Skip to main content

The Steganographic File System

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Abstract

Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability. However, existing plausible deniability mechanisms, such as the one-time pad, are of rather limited scope.

In this paper, we present the steganographic file system. This is a storage mechanism designed to give the user a very high level of protection against being compelled to disclose its contents. It will deliver a file to any user who knows its name and password; but an attacker who does not possess this information and cannot guess it, can gain no information about whether the file is present, even given complete access to all the hardware and software. We provide two independent constructions, which make slightly different assumptions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “Measuring the Diversity of Random Number Generators”, R Anderson, R Gibbens, C Jagger, F Kelly, M Roe, preprint, 1992

    Google Scholar 

  2. “Stretching the Limits of Steganography”, RJ Anderson, in [3] pp 39–48

    Google Scholar 

  3. Information Hiding’, May 30–June 1 1996; proceedings published by Springer as Lecture Notes in Computer Science vol 1174

    Google Scholar 

  4. “Tamper Resistance-a Cautionary Note”, RJ Anderson, MG Kuhn, in Proceedings of the Second Usenix Workshop on Electronic Commerce (Nov 96) pp 1–11

    Google Scholar 

  5. Plausible Deniability’, DR Beaver, Pragocrypt 96 pp 272–288

    Google Scholar 

  6. “Plug and Play Encryption”, DR Beaver, in Advances in Cryptology-Crypto 97, Springer LNCS v 1294 pp 75–89

    Chapter  Google Scholar 

  7. “Can invisible watermark resolve rightful ownerships?”, S Craver, N Memon, BL Yeo, MM Yeung, Fifth Conference on Storage and Retrieval for Image and Video Database, 13–14 February 1997, San Jose, CA; SPIE vol 3022 pp 310–321

    Google Scholar 

  8. “Attacks on Copyright Marking Systems”, FAP Petitcolas, RJ Anderson, MG Kuhn, in these proceedings; this paper is also available online at http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/

  9. Request for Proposals-Embedded Signalling Systems’, June 97, International Federation of the Phonographic Industry, 54 Regent Street, London W1R 5PJ

    Google Scholar 

  10. “File Organisation: Implementation of a Method Guaranteeing Retrieval in One Access”, P å Larson, A Kajla, in Communications of the ACM v 27 no 7 (July 1984) pp 670–677

    Article  Google Scholar 

  11. Cryptography and Evidence’, M Roe, Cambridge University (PhD Thesis, 1997)

    Google Scholar 

  12. “Developer tortured by raiders with crowbars”, M Weaver, Daily Telegraph, 31 October 97

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anderson, R., Needham, R., Shamir, A. (1998). The Steganographic File System. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics