The Steganographic File System
Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability. However, existing plausible deniability mechanisms, such as the one-time pad, are of rather limited scope.
In this paper, we present the steganographic file system. This is a storage mechanism designed to give the user a very high level of protection against being compelled to disclose its contents. It will deliver a file to any user who knows its name and password; but an attacker who does not possess this information and cannot guess it, can gain no information about whether the file is present, even given complete access to all the hardware and software. We provide two independent constructions, which make slightly different assumptions.
KeywordsSecurity Level Forward Error Correction Block Cipher High Level Process Access Control Mechanism
Unable to display preview. Download preview PDF.
- 1.“Measuring the Diversity of Random Number Generators”, R Anderson, R Gibbens, C Jagger, F Kelly, M Roe, preprint, 1992Google Scholar
- 2.“Stretching the Limits of Steganography”, RJ Anderson, in  pp 39–48Google Scholar
- 3.‘Information Hiding’, May 30–June 1 1996; proceedings published by Springer as Lecture Notes in Computer Science vol 1174Google Scholar
- 4.“Tamper Resistance-a Cautionary Note”, RJ Anderson, MG Kuhn, in Proceedings of the Second Usenix Workshop on Electronic Commerce (Nov 96) pp 1–11Google Scholar
- 5.‘Plausible Deniability’, DR Beaver, Pragocrypt 96 pp 272–288Google Scholar
- 7.“Can invisible watermark resolve rightful ownerships?”, S Craver, N Memon, BL Yeo, MM Yeung, Fifth Conference on Storage and Retrieval for Image and Video Database, 13–14 February 1997, San Jose, CA; SPIE vol 3022 pp 310–321Google Scholar
- 8.“Attacks on Copyright Marking Systems”, FAP Petitcolas, RJ Anderson, MG Kuhn, in these proceedings; this paper is also available online at http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/
- 9.‘Request for Proposals-Embedded Signalling Systems’, June 97, International Federation of the Phonographic Industry, 54 Regent Street, London W1R 5PJGoogle Scholar
- 11.‘Cryptography and Evidence’, M Roe, Cambridge University (PhD Thesis, 1997)Google Scholar
- 12.“Developer tortured by raiders with crowbars”, M Weaver, Daily Telegraph, 31 October 97Google Scholar