Running Head: DATA HIDING TECHNIQUES Data Hiding Techniques Students Name Institution Affiliation Data Hiding Techniques Steganography refers to the method of concealing information such as a file, message or images in another piece of information (Webopedia.com, 2014). Alternate data stream uses Window`s New Technology File Format (NTFS) feature used to aid Macintosh Hierarchical File System (HFS) that stores icons and information from a file using resource forks. It has the ability of injecting a file into existing files without changing their functionality or size. The growing use of data hiding techniques has led to rise of illicit material trafficking. Detecting hidden information as well as understanding the structure of this technology is very crucial to many organizations.
DATA HIDING TECHNIQUES Explain how a user could utilize ADS to hide data and explain other destructive uses that exist for ADS. Alternate data hiding stream is widely used because of its characteristic o keep the default size and function of the file. File information such as name, size, location and timestamp are stored in the Master File Table (MFT) in NTFS (WindowSecurity.com, 2004). Other files of less than 1500 bytes can also be stored in the MFT. MFT can also hold resident, inside the MFT or non-resident, outside the MFT but on a disk file attributes. Thus, data streams, used as attribute information, can be stored outside the file`s conventional boundaries using a pointer to find different file portions physically located in the storage device. ADSs introduces security implications since viruses cannot be detected by an antivirus due to ADS’ ability to hide executable code in the form of VBS, CMD, EXE or BAT files (Searchsecurity.techtarget.com, 2014). System backups are difficult because ADS exists below the file structure leading to back up of default file stream only. ADS difficulty of
You've reached the end of your free preview.
Want to read all 5 pages?
- Spring '14
- alternate data, alternate data stream