1. Problem Definition
A classic problem of computer security is the mitigation of covert channels. First
introduced by Lampson , a covert channel in a (single-host or distributed) computer
system can be roughly defined as any means by which two processes or users can
exchange information in violation of security policy. While the exact detection of usable
covert channels in a system is un decidable, many conservative.
Approaches exist to detect and eliminate all potential covert channels; for example, the
US Department of Defense “Light Pink Book” on covert channel analysis includes
detailed procedures to find and eliminate covert channels. Unfortunately, the cost of such
elimination is often prohibitive; in this case, the Light Pink Book recommends techniques
to limit the bandwidth of covert channels and requires auditing to detect any use of the
covert channel.
Problem Identification
This Project we focuses on the dual problem of steganography How can two
communicating entities send secret messages over a public or audited channel so that a
third party such as the reference monitor cannot detect the presence of the secret
messages? Notice how the goal of steganography is different from classical encryption,
which seeks to conceal the content of secret messages: Steganography is about hiding the
very existence of the secret messages.
we use techniques from cryptography and complexity theory to answer the question
“under what conditions is (secure) steganography possible?” We give cryptographic
definitions for symmetric-key stegosystems and steganographic secrecy against a passive
adversary in terms of indistinguishability from a probabilistic channel process.
We show that a widely believed complexitytheoretic assumption (the existence of
a one-way function) and access to a channel oracle are both necessary and sufficient
conditions for the existence of secure steganography relative to any channel. We
furthermore give a construction that has essentially optimal bandwidth when compared
with known provably secure constructions. Finally, we consider the question of robust
steganography
that resists attempts to censor the use of a covert channel; we prove necessary and
sufficient conditions for the existence of a secure robust stegosystem and give a provably
robust stegosystem with nearly optimal bandwidth under attack.
2. Existing System:
Classic problem of computer security is the mitigation of covert channels, a
covert channel in a (single-host or distributed) computer system can be roughly defined
as any means by which two processes or users can exchange information in violation of
security policy. While the exact detection of usable covert channels in a system is
undividable, many conservative approaches exist to detect and eliminate all potential
covert channels.
Proposed System:
Focuses on the dual problem of steganography how can two communicating
entities send secret messages over a public or audited channel so that a third party such as
the reference monitor cannot detect the presence of the secret messages the goal of
steganography is different from classical encryption, which seeks to conceal the content
of secret messages. Steganography is about hiding the very existence of the secret
messages.
We give a necessary condition on the amount of disruption the adversary is
allowed in terms of a worst case measure of mutual information. We give a construction
that is provably secure and computationally efficient and has nearly optimal bandwidth,
assuming repeatable access to the channel distribution
System configuration
Hardware Requirements:
3. Processor Type : Pentium -IV
Speed : 2.4 GHZ
Ram : 512 MB RAM
Hard disk : 20 GB HD (Min)
Software Requirements:
Operating System : Win2000/XP/Linux
Programming Package : JAVA / J2EE.
Tools : Eclipse.5.1
SDK : JDK1.5.0.
Server : Tomcat server 5.0
SYSTEM DESIGN
3.1 Design Overview
Input-
Video Processing
Stegnography
Reverse
Processing Video+ Image
Input-
Image
4. Modules
In this project we are having four modules for the video stegnograpgh
Modules:
1. Choosing the Input Files(Video and Image)
2. Stgenography processing
3. Reverse the Stegnography
4. Checking the Files after stegnography
Module 1: Choosing the Input Files(Video and Image)
In this module user should select the input file as video and image file. Image file
size should be less that video file. After processing the these things will be in the separate
folder
Module 2: Stgenography processing
Module 3: Reverse the Stegnography
Module 4: Checking the Files after stegnography
If someone has decided to hide their data, they will probably be able to do so fairly
easily. The only way to detect steganography is to be actively looking for in specific files,
or to get very lucky. Sometimes an actively enforced security policy can provide the
answer: this would require the implementation of company-wide acceptable use policies
that restrict the installation of unauthorized programs on company computers.
5. Using the tools that you already have to detect movement and behavior of traffic on your
network may also be helpful. Network intrusion detection systems can help
administrators to gain an understanding of normal traffic in and around your network and
can thus assist in detecting any type of anomaly, especially with any changes in the
behavior of increased movement of large images around your network. If the
administrator is aware of this sort of anomalous activity, it may warrant further
investigation. Host-based intrusion detection systems deployed on computers may also
help to identify anomalous storage of image and/or video files.
Two methods of attacking steganography, which really are also methods of detecting it.
They are the visual attack (actually seeing the differences in the files that are encoded)
and the statistical attack: "The idea of the statistical attack is to compare the frequency
distribution of the colors of a potential stego file with the theoretically expected
frequency distribution for a stego file." It might not be the quickest method of protection,
but if you suspect this type of activity, it might be the most effective. For JPEG files
specifically, a tool called Stegdetect, which looks for signs of steganography in JPEG
files, can be employed. Stegbreak, a companion tool to Stegdetect, works to decrypt
possible messages encoded in a suspected steganographic file, should that be the path you
wish to take once the stego has been detected.
CONCLUSION AND FUTURE SCOPE
Steganography is a fascinating and effective method of hiding data that has been used
throughout history. Methods that can be employed to uncover such devious tactics, but
the first step are awareness that such methods even exist. There are many good reasons as
well to use this type of data hiding, including watermarking or a more secure central
storage method for such things as passwords, or key processes, video, audio..etc .
Regardless, the technology is easy to use and difficult to detect. The more that you know
about its features and functionality, the more ahead you will be in the game.