CN1317712C - Files hiding method based on NTFS disk files system structure - Google Patents

Files hiding method based on NTFS disk files system structure Download PDF

Info

Publication number
CN1317712C
CN1317712C CNB031185460A CN03118546A CN1317712C CN 1317712 C CN1317712 C CN 1317712C CN B031185460 A CNB031185460 A CN B031185460A CN 03118546 A CN03118546 A CN 03118546A CN 1317712 C CN1317712 C CN 1317712C
Authority
CN
China
Prior art keywords
file
hidden
name
stream
hiding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031185460A
Other languages
Chinese (zh)
Other versions
CN1434451A (en
Inventor
刘玉
熊祖彪
朱光喜
饶炤骅
李伟霞
王长强
刘洋
徐一新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CNB031185460A priority Critical patent/CN1317712C/en
Publication of CN1434451A publication Critical patent/CN1434451A/en
Application granted granted Critical
Publication of CN1317712C publication Critical patent/CN1317712C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention discloses a file hiding method based on an NTFS disk file system structure, which comprises the following steps: (1) illegal file name characters in a whole pathname of a file to be hidden are removed, and a unique flow name is obtained; (2) a data flow of root directory objects is newly created, and the name of the data flow is the flow name obtained by the steps (1); (3) contents of the file to be hidden are copied into the flow created by the step (2); (4) the file to be hidden is deleted; (5) the whole path information of the file to be hidden is recorded. The present invention can hide files of any formats under an NTFS file system, a hidden effect has permanence, and hidden failure can not be caused by the change of an operating system. Host files can not be generated, and the present invention has high safety.

Description

File hiding method based on NTFS disk file system structure
Technical field
The invention belongs to the Computer Applied Technology field, be specifically related to a kind of file hiding method based on NTFS disk file system structure.
Background technology
On 08 26th, 1998 disclosed Chinese patents 02115105.9 are a kind of distortion-free data-hiding methods.It utilizes the redundancy that exists in the image, guarantees in the embedding bulk information that in image the image of embedding information any distortion can not occur.The security that hides Info is very big to the dependence of image file.If image file is changed, then may cause hiding Info losing fully.
Existing file hiding method has:
(1) data that will treat hidden file merge in another file, and such as system file or image file (being called " host's file "), host's file itself also is not destroyed, and reaches hiding purpose.The security of this kind method is not high enough, if obtained host's file and merging mode by the disabled user, hiding Info just is extracted out easily; Simultaneously, if host's file is changed or deleted, will causing, hidden file can not correctly recover.
(2) open up the monitor process of an operating system, when hidden file was attempted to show in user's operation, monitor process was intercepted and captured this message, judged to show whether the condition of hidden file satisfies, if do not satisfy, then stop operating system to show the operation of hidden file by force.This method takes to intercept and capture the mode of message, therefore can only realize the file hiding under the current operation system.It relies on the continuous service in monitor process, in case process is closed, perhaps enters the operating system that other does not move this process, and file will show.
Summary of the invention
The object of the present invention is to provide a kind of file hiding method based on NTFS disk file system structure that can overcome above-mentioned defective, this hidden method utilizes the file of new technology file system can have the characteristics of a plurality of data stream, hide from the disk file system structure, make and very high security is arranged file hiding separating system environment.
For achieving the above object, a kind of file hiding method based on NTFS disk file system structure may further comprise the steps:
(1) removes illegal file name character in the comspec treat hidden file, draw a unique stream title;
(2) newly-built root directory object data stream, its name is called the stream title that step (1) draws;
(3) content that will treat hidden file copies in the stream that step (2) creates;
(4) hidden file is treated in deletion;
(5) the complete trails information of hidden file treated in record.
The present invention can hide the arbitrary format file under the new technology file system, and concealment effect has permanent, can't cause because of the change of operating system hiding losing efficacy.Can not generate host's file, have higher security.
Description of drawings
Fig. 1 is for adopting the process flow diagram of hidden method hidden file of the present invention;
Fig. 2 is for recovering the process flow diagram of above-mentioned hidden file.
Embodiment
New technology file system is based on the method store data of object and attribute, and file and catalogue all are objects, and the content of file and catalogue, size, creation-time or the like are exactly attribute.An object can have a plurality of attributes, or even data stream property.Data stream is divided into unnamed stream and name stream again.Check in the mode at the All Files of operating system, the unnamed stream of a meeting display file, the size of file also only relates to the size of unnamed data stream.And name stream allows to be connected to extra data in the file as file system, can't see in file browser, can only visit by a mode of " filename: flow " with the file I/O function among the Windows SDK.The front is mentioned, and catalogue also is a kind of object, therefore also supports multiple data stream.If we in a name stream of root directory, delete source file to the copying data for the treatment of hidden file then, can realize hiding of file.
Described in its hiding step such as the summary of the invention, the step of recovering hidden file is as follows:
(1) reads the complete trails information for the treatment of recovery file.
(2) according to treating the comspec of recovery file, the title of recovery file treated its called after by a newly-built file.
(3) remove illegal file name character in the comspec treat recovery file, draw a unique stream title.
(4) name in the root directory object is called the content of the data stream of the stream title that step (3) draws, copies in the newly-built file of step (2).
(5) name is called the data stream of the stream title that step (3) draws in the deletion root directory object.
Illustrate said method below:
Hide the test.txt file as needs, this document be positioned at " C: Documents andSettings Administrator My Documents file hiding " under the catalogue.
(1) the deletion comspec " C: Documents and Settings Administrator MyDocuments file hiding test.txt " in "<〉: "/| " etc. unallowable instruction digit obtain stream name " a CDocuments and SettingsAdministratorMy Documents file hiding test.txt ";
(2) with a data stream of the newly-built root directory object of CreateFile function, by name ": CDocuments and SettingsAdministratorMy Documents file hiding test.txt ";
(3) use ReadFile, the WriteFile function is in the copying to of the byte of a byte of content of test.txt file ": CDocuments and SettingsAdministratorMy Documents file hiding test.txt " stream;
(4) with DeleteFile function deletion test.txt file;
(5) record complete trails information " C: Documents and Settings Administrator MyDocuments file hiding test.txt " in a certain file under the system directory, as " C: WINNT system32 Hidels.sys "
CreateFile wherein, ReadFile, WriteFile, functions such as DeleteFile are the file I/O function among the Windows SDK.
Recover the file that preamble is hidden
(1) from " C: WINNT system32 Hidels.sys " read the file complete trails information " C: Documents and Settings Administrator My Documents file hiding test.txt ";
(2) newly-built test.txt file be positioned at " C: Documents andSettings Administrator My Documents file hiding " under the catalogue;
(3) from comspec " C: Documents and Settings Administrator MyDocuments file hiding test.txt " deletion "<〉: "/| " etc. unallowable instruction digit obtain stream name ": CDocuments and SettingsAdministratorMy Documents file hiding test.txt ";
(4) content in copy ": the CDocuments and SettingsAdministratorMy Documents file hiding test.txt " stream is in the test.txt file;
(5) deletion ": CDocuments and SettingsAdministratorMy Documents file hiding test.txt " stream.

Claims (1)

1, a kind of file hiding method based on NTFS disk file system structure may further comprise the steps:
(1) removes illegal file name character in the comspec treat hidden file, draw a unique stream title;
(2) newly-built root directory object data stream, its name is called the stream title that step (1) draws;
(3) content that will treat hidden file copies in the stream that step (2) creates;
(4) hidden file is treated in deletion;
(5) the complete trails information of hidden file treated in record.
CNB031185460A 2003-01-25 2003-01-25 Files hiding method based on NTFS disk files system structure Expired - Fee Related CN1317712C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031185460A CN1317712C (en) 2003-01-25 2003-01-25 Files hiding method based on NTFS disk files system structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031185460A CN1317712C (en) 2003-01-25 2003-01-25 Files hiding method based on NTFS disk files system structure

Publications (2)

Publication Number Publication Date
CN1434451A CN1434451A (en) 2003-08-06
CN1317712C true CN1317712C (en) 2007-05-23

Family

ID=27634421

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031185460A Expired - Fee Related CN1317712C (en) 2003-01-25 2003-01-25 Files hiding method based on NTFS disk files system structure

Country Status (1)

Country Link
CN (1) CN1317712C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022117A1 (en) * 2005-07-21 2007-01-25 Keohane Susann M Accessing file system snapshots directly within a file system directory
CN107230484B (en) * 2017-06-22 2018-04-20 北京众谊越泰科技有限公司 A kind of method for hiding specified file and file

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002084482A1 (en) * 2001-04-12 2002-10-24 W. Quinn, Inc. System and method for using memory mapping to scan a master file table
CN1382331A (en) * 1999-10-22 2002-11-27 松下电器产业株式会社 Active data hiding for secure electronic media distribution
WO2002102055A1 (en) * 2001-06-12 2002-12-19 International Business Machines Corporation Method of invisibly embedding and hiding data into soft-copy text documents

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1382331A (en) * 1999-10-22 2002-11-27 松下电器产业株式会社 Active data hiding for secure electronic media distribution
WO2002084482A1 (en) * 2001-04-12 2002-10-24 W. Quinn, Inc. System and method for using memory mapping to scan a master file table
WO2002102055A1 (en) * 2001-06-12 2002-12-19 International Business Machines Corporation Method of invisibly embedding and hiding data into soft-copy text documents

Also Published As

Publication number Publication date
CN1434451A (en) 2003-08-06

Similar Documents

Publication Publication Date Title
US11809605B2 (en) Method and system for storage-based intrusion detection and recovery
US7610307B2 (en) Method and system of detecting file system namespace changes and restoring consistency
US7330863B2 (en) Method and systems for hyperlinking files
Garfinkel et al. A general strategy for differential forensic analysis
MXPA05011696A (en) Method and system for maintaining namespace consistency with a file system.
US9842155B2 (en) Systems and methods for file loading
US8863287B1 (en) Commonality factoring pattern detection
Mikus et al. An analysis of disc carving techniques
Wahyudi et al. Virtual machine forensic analysis and recovery method for recovery and analysis digital evidence
CN1317712C (en) Files hiding method based on NTFS disk files system structure
AlHarbi et al. Forensic analysis of anti‐forensic file‐wiping tools on Windows
Richard et al. In-place file carving
CN100341071C (en) Files hiding method based on FAT32 disk files system structure
Craiger Recovering digital evidence from Linux systems
Raychaudhuri A Comparative Study of Analysis and Extraction of Digital Forensic Evidences from exhibits using Disk Forensic Tools.
Jones Deleted audio file decay on a digital voice recorder
CN1352426A (en) Computer virus prevention method
CN100428260C (en) Minimum invading data hidding method of computer network
Garfinkel The prevalence of encoded digital trace evidence in the nonfile space of computer media
Kiltz et al. Hidden in Plain Sight-Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics
KR102294926B1 (en) Automated system for forming analyzed data by extracting original data
Mathew et al. A survey on different video restoration techniques
Knight Forensic disk imaging report
Mostovoy Modern Methods of Detecting and Eradicating Known and Unknown Viruses
Hosgor Detection and Mitigation of Anti-Forensics Using Forensic Tools

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee