This modification of the ext2 kernel module allows to create files (cover files) whose block arrangement gets manipulated to represent a binary code, which can be extracted later.
The information hiding approach used in this project was introduced by Khan et. al in
'Designing a cluster-based covert channel to evade disk investigation and forensics' (1st approach).
Algorithm:
When a cover file is written, an even blocknr. (for the 1st datablock) is choosen to represent a 0 or an odd...