The Steganographic File System

Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability. However, existing plausible deniability mechanisms, such as the one-time pad, are of rather limited scope.

[1]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[2]  Mihir Bellare,et al.  Advances in Cryptology — CRYPTO '97 , 1996, Lecture Notes in Computer Science.

[3]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[4]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[5]  Per-Åke Larson,et al.  File organization: implementation of a method guaranteeing retrieval in one access , 1984, CACM.

[6]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[7]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[8]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[9]  Donald Beaver,et al.  Plug and Play Encryption , 1997, CRYPTO.