期刊文献+

G Bytes Data Hiding Method Based on Cluster Chain Structure 被引量:1

G Bytes Data Hiding Method Based on Cluster Chain Structure
原文传递
导出
摘要 Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To improve the capability of hiding huge data file in disk with high efficiency. In this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide data. CryptFS can quickly hide data file with G bytes size in less than 0.1s. The time used for hiding and recovering data is irrelevant to the size of data file, and the reliability of the hidden file is high, which will not be overlaid by new created file and disk defragment. Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To improve the capability of hiding huge data file in disk with high efficiency. In this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide data. CryptFS can quickly hide data file with G bytes size in less than 0.1s. The time used for hiding and recovering data is irrelevant to the size of data file, and the reliability of the hidden file is high, which will not be overlaid by new created file and disk defragment.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期443-448,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z434) the "Core Electronic Devices, High_End General Chip, and Fundamental Software" Major Project (2013JH00103)
关键词 data hiding file system cluster chain index entry efficiency ROBUSTNESS data hiding file system cluster chain index entry efficiency robustness
  • 相关文献

参考文献3

二级参考文献33

  • 1白剑,徐迎晖,杨榆.利用文本载体的信息隐藏算法研究[J].计算机应用研究,2004,21(12):147-148. 被引量:12
  • 2周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 3刘安洁,崔广润.在Dos下恢复Windows回收站中的文件[J].科技情报开发与经济,2006,16(23):250-251. 被引量:1
  • 4Bender W, Gruhl D, and Morlmoto N, et al.. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3&4): 313-336.
  • 5Maher K. TEXTO. URL:ftp://ftp.funet.fi/pub/crypt/ steganography/texto.tar.gz.
  • 6Mark C. Hiding the hidden: A software system for concealing ciphertext as innocuous text [D]. [Master dissertation], University of Wisconsin-Milwaukee. http://www. NICETEXT. dissertationcom /NICETEXT/doc/thesis.pdf. 1997.
  • 7Mark C, Davida G, and Rennhard M. A practical and effective approach to large-scale automated linguistic steganography [C]. Lecture Notes in Computer Science, 2001, Vol. 2200: 156-167.
  • 8Chen Zhi-li, Huang Liu-sheng, and Yu Zhen-shan, et al.. Linguistic steganography detection using statistical characteristics of correlations between words [C]. Information Hiding 2008, USA, May 2008, LNCS 5284: 224-235.
  • 9Chen Zhi-li, Huang Liu-sheng, and Yu Zhen-shan, et al.. A statistical algorithm for linguistic steganography detection based on distribution of words [C]. ARES2008, Spain, Mar 2008: 558-563.
  • 10Chen Zhi-li, Huang Liu-sheng, and Yu Zhen-shan, et al.. Effective Linguistic Steganography Detection [C]. CIT Workshops, Australia, Jul 2008: 224-229.

共引文献9

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部