SlideShare a Scribd company logo
FILE SECURITY SYSTEM
Under Guidance Presented By
Er. Alok Jadaun Dheeraj Kumar Singh(1000410015)
Pushpendra Kumar(1100410901)
Rohit Singh(1000410061)
Surendra Kr Kannoujiya(1000410083)
CONTENT
 Introduction
 Objective of file security system
 Technique used in file security system
 Encryption
 Decryption
 Symmetric-key encryption
 Asymmetric-key encryption
 How much module used in the project
 Algorithm is used in the encryption process
 Flow chart of AES algorithm
 Requirement of Software and hardware
 Snapshots
 Conclusion
INTRODUCTION
 The File Security System is a software, which tries
to alter the originality of the text into some
encrypted form.
 It is use to store the information in a form that is
unreadable.
 The Application should have a reversal process as
of which should be in a position to decrypt the data
to its original format upon the proper request by the
user.
OBJECTIVE OF FILE SECURITY SYSTEM
 Secure the file from unauthorized user.
 If hacker get the encrypted file they can not read to
the file.
 It give confidentiality to user that information is
secure.
TECHNIQUE USED IN FILE SECURITY
SYSTEM
 Encryption
 Decryption
ENCRYPTION
 Encryption is the process of encoding messages (or
information) in such a way that eavesdroppers or
hackers cannot read it, but only authorized parties
can access.
 In an Encryption scheme, the message or
information (referred to as plaintext) is encrypted
using an encryption algorithm, turning it into an
unreadable cipher text. This is usually done with the
use of an encryption key.
 This is usually done with the use of an encryption key
which specifies how the message is to be encoded.
There are two basic types of encryption schemes:
 Symmetric-key encryption
 Asymmetric-key(public-key encryption)
DECRYPTION
 Decryption should be a reverse process of encryption
process.
 Decryption is the process of encoding messages (or
information) in such a way that it become readable for
users.
 It convert the cipher text into the plain text after
encryption.
SYMMETRIC-KEY ENCRYPTION
 In symmetric-key schemes, the encryption and
decryption keys are the same.
 It involves a single secret key which both the message-
sender and the message-recipient must have.
 It is used by the sender to encrypt the message and by
the recipient to decrypt it.
Fig 1.0- SYMMETRIC-KEY ENCRYPTION
ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)
 The term "asymmetric" stems from the use of different
keys to perform these opposite functions.
 It requires two separate keys one of which is secret (or
private) and one of which is public.
 The public key is used to encrypt plaintext and the private
key is used to decrypt cipher text.
Fig 2.0- ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)
MODULES
 We used three module in the project.
(1) Input module.
(2) Process module.
(3) Output module.
INPUT MODULE
 In this module we implement attachment of file in the file
security system.
 In this module we select the file type.
PROCESS MODULE
 In this module we implement the process for the file
security system like as encryption and decryption.
OUTPUT MODULE
 In this module we save the encrypted file in
memory.
ALGORITHM USE IN ENCRYPTION
PROCESS
 AES (Advanced Encryption Standard )
AES:-AES is a symmetric-key algorithm, meaning the
same key is used for both encrypting and
decrypting the data.
The Advanced Encryption Standard (AES) is a
specification for the encryption of electronic data
established by the U.S. National Institute of
Standards and Technology (NIST) in 2001.
FLOW CHART OF AES ALGORITHM
REQUIREMENT OF SOFTWARE
Software:-The Software used in file security system are as
follows:-
 Operating System
 Windows NT/2000 (Client/Server)
 Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.
REQUIREMENT OF HARDWARE
Hardware:-The hardware used in iris recognition are as
follows:-
 Pentium IV Processor with 1.9 GHz Clock Speed
 512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card
SNAPSHOTS
SELECT THE FILE LOCATION
AFTER SELECT THE FILE
SELECTED FILE BEFORE ENCRYPTION
MESSAGE OF SUCCESSFUL ENCRYPTION
AFTER ENCRYPTION PROCESS FILE IS
SELECT FILE FOR DECRYPTION
AFTER DECRYPTION
AFTER DECRYPTION PROCESS THE FILE IS
CONCLUSION
A new simple tool has been created, which is
targeted for use inside of a small institution such as
a small university for lecturers’ daily use of sending
exam files and sensitive material such that the
material can be encrypted and the file is sent in one
e-mail while the encryption key is sent in another e-
mail or via any secure communication channel.
REFERENCES
 NVIDIA. High Performance Computing GPU
[EB/OL].(2010-01-09).
http://www.nvidia.cn/object/tesla_computing_solutio
ns_cn.html.
 Sara Tedmori, Nijad Al-Najdawi ” Lossless Image
Cryptography Algorithm Based on Discrete Cosine
Transform” IAJIT First Online Publication
vol.3,2011.
 Dariusz Stanislawek , “Free Software copyright
1997 - 2006 ”
http://members.ozemail.com.au/~nulifetv/freezip/fre
eware
 Vivek Thakur , “NeekProtect”,
http://neekprotect.sourceforge.net , 2006.
 S.Quinlan and S. Dorward. Venti: a new
approach to archival storage. In Proc. of the
Conference on File and Storage Technologies
(FAST), January 2002.
 HweeHwa Pang, Kian-Lee Tan and Xuan Zhou.
“StegFS: Steganographic F System”, IEEE
International Conference on Data Engineering, Mar
2003.
File Security System_2

More Related Content

What's hot

Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
limsh
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Ramadhi Irawan
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Information and network security 8 security mechanisms
Information and network security 8 security mechanismsInformation and network security 8 security mechanisms
Information and network security 8 security mechanisms
Vaibhav Khanna
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
umme ayesha
 

What's hot (20)

Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Web Security
Web SecurityWeb Security
Web Security
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Information and network security 8 security mechanisms
Information and network security 8 security mechanismsInformation and network security 8 security mechanisms
Information and network security 8 security mechanisms
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Ceh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniquesCeh v5 module 13 web based password cracking techniques
Ceh v5 module 13 web based password cracking techniques
 
Operating system security
Operating system securityOperating system security
Operating system security
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 

Similar to File Security System_2

L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
Dheeraj Kumar Singh
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
Ancy Mariam Babu
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
Jamal Jamali
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
Mukesh Chinta
 

Similar to File Security System_2 (20)

L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 

File Security System_2

  • 1. FILE SECURITY SYSTEM Under Guidance Presented By Er. Alok Jadaun Dheeraj Kumar Singh(1000410015) Pushpendra Kumar(1100410901) Rohit Singh(1000410061) Surendra Kr Kannoujiya(1000410083)
  • 2. CONTENT  Introduction  Objective of file security system  Technique used in file security system  Encryption  Decryption  Symmetric-key encryption  Asymmetric-key encryption  How much module used in the project  Algorithm is used in the encryption process  Flow chart of AES algorithm  Requirement of Software and hardware  Snapshots  Conclusion
  • 3. INTRODUCTION  The File Security System is a software, which tries to alter the originality of the text into some encrypted form.  It is use to store the information in a form that is unreadable.  The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user.
  • 4. OBJECTIVE OF FILE SECURITY SYSTEM  Secure the file from unauthorized user.  If hacker get the encrypted file they can not read to the file.  It give confidentiality to user that information is secure.
  • 5. TECHNIQUE USED IN FILE SECURITY SYSTEM  Encryption  Decryption
  • 6. ENCRYPTION  Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but only authorized parties can access.  In an Encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key.
  • 7.  This is usually done with the use of an encryption key which specifies how the message is to be encoded. There are two basic types of encryption schemes:  Symmetric-key encryption  Asymmetric-key(public-key encryption)
  • 8. DECRYPTION  Decryption should be a reverse process of encryption process.  Decryption is the process of encoding messages (or information) in such a way that it become readable for users.  It convert the cipher text into the plain text after encryption.
  • 9. SYMMETRIC-KEY ENCRYPTION  In symmetric-key schemes, the encryption and decryption keys are the same.  It involves a single secret key which both the message- sender and the message-recipient must have.  It is used by the sender to encrypt the message and by the recipient to decrypt it.
  • 11. ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)  The term "asymmetric" stems from the use of different keys to perform these opposite functions.  It requires two separate keys one of which is secret (or private) and one of which is public.  The public key is used to encrypt plaintext and the private key is used to decrypt cipher text.
  • 12. Fig 2.0- ASYMMETRIC KEY(PUBLIC KEY ENCRYPTION)
  • 13. MODULES  We used three module in the project. (1) Input module. (2) Process module. (3) Output module.
  • 14. INPUT MODULE  In this module we implement attachment of file in the file security system.  In this module we select the file type. PROCESS MODULE  In this module we implement the process for the file security system like as encryption and decryption. OUTPUT MODULE  In this module we save the encrypted file in memory.
  • 15. ALGORITHM USE IN ENCRYPTION PROCESS  AES (Advanced Encryption Standard ) AES:-AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
  • 16. FLOW CHART OF AES ALGORITHM
  • 17. REQUIREMENT OF SOFTWARE Software:-The Software used in file security system are as follows:-  Operating System  Windows NT/2000 (Client/Server)  Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.
  • 18. REQUIREMENT OF HARDWARE Hardware:-The hardware used in iris recognition are as follows:-  Pentium IV Processor with 1.9 GHz Clock Speed  512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card
  • 20. SELECT THE FILE LOCATION
  • 22. SELECTED FILE BEFORE ENCRYPTION
  • 23. MESSAGE OF SUCCESSFUL ENCRYPTION
  • 25. SELECT FILE FOR DECRYPTION
  • 28. CONCLUSION A new simple tool has been created, which is targeted for use inside of a small institution such as a small university for lecturers’ daily use of sending exam files and sensitive material such that the material can be encrypted and the file is sent in one e-mail while the encryption key is sent in another e- mail or via any secure communication channel.
  • 29. REFERENCES  NVIDIA. High Performance Computing GPU [EB/OL].(2010-01-09). http://www.nvidia.cn/object/tesla_computing_solutio ns_cn.html.  Sara Tedmori, Nijad Al-Najdawi ” Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform” IAJIT First Online Publication vol.3,2011.  Dariusz Stanislawek , “Free Software copyright 1997 - 2006 ” http://members.ozemail.com.au/~nulifetv/freezip/fre eware
  • 30.  Vivek Thakur , “NeekProtect”, http://neekprotect.sourceforge.net , 2006.  S.Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. of the Conference on File and Storage Technologies (FAST), January 2002.  HweeHwa Pang, Kian-Lee Tan and Xuan Zhou. “StegFS: Steganographic F System”, IEEE International Conference on Data Engineering, Mar 2003.