scispace - formally typeset
Search or ask a question

Showing papers by "Peter Honeyman published in 2002"


Proceedings Article
01 Jan 2002
TL;DR: A detection framework that includes tools to retrieve images from the world wide web and automatically detect whether they might contain steganography content is presented, to determine whether there is steganographic content on the Internet.
Abstract: Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their accomplices. In particular, images on the Internet were mentioned as the communication medium. While the newspaper articles sounded very dire, none substantiated these rumors. To determine whether there is steganographic content on the Internet, this paper presents a detection framework that includes tools to retrieve images from the world wide web and automatically detect whether they might contain steganographic content. To ascertain that hidden messages exist in images, the detection framework includes a distributed computing framework for launching dictionary attacks hosted on a cluster of loosely coupled workstations. We have analyzed two million images downloaded from eBay auctions and one million images obtained from a USENET archive but have not been able to find a single hidden message.

293 citations


Proceedings Article
10 Jun 2002
TL;DR: A simple sequential write benchmark is introduced and used to improve the Linux NFS client’s write performance, which improves memory write throughput to NFS files by more than a factor of three.
Abstract: We introduce a simple sequential write benchmark and use it to improve the Linux NFS client’s write performance. We reduce the latency of the write() system call, improve SMP write performance, and reduce kernel CPU processing during sequential writes. Memory write throughput to NFS files improves by more than a factor of three.

13 citations


Proceedings ArticleDOI
14 Aug 2002
TL;DR: The Advanced Packet Vault is described, a cryptographically secured archiver of network packet data that reliably captures all packets on a 100 Mbps Ethernet network, encrypts them, and writes them to long-term magnetic tape storage for later analysis and evidentiary purposes.
Abstract: This paper describes the Advanced Packet Vault, a cryptographically secured archiver of network packet data that reliably captures all packets on a 100 Mbps Ethernet network, encrypts them, and writes them to long-term magnetic tape storage for later analysis and evidentiary purposes. Based on a previous prototype, the APV provides an enhanced cryptographic organization that allows site-specific selection of the encryption format and that permits selected traffic to be made available without compromising the security of other traffic. The APV operates reliably under a continuous 100 Mbps load. We conclude with a discussion of future work necessary to scale the APV beyond 100 Mbps.© (2002) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

7 citations