SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Problem Definition
A classic problem of computer security is the mitigation of covert channels. First
introduced by Lampson , a covert channel in a (single-host or distributed) computer
system can be roughly defined as any means by which two processes or users can
exchange information in violation of security policy. While the exact detection of usable
covert channels in a system is un decidable, many conservative.

Approaches exist to detect and eliminate all potential covert channels; for example, the
US Department of Defense “Light Pink Book” on covert channel analysis includes
detailed procedures to find and eliminate covert channels. Unfortunately, the cost of such
elimination is often prohibitive; in this case, the Light Pink Book recommends techniques
to limit the bandwidth of covert channels and requires auditing to detect any use of the
covert channel.

Problem Identification
This Project we focuses on the dual problem of steganography How can two
communicating entities send secret messages over a public or audited channel so that a
third party such as the reference monitor cannot detect the presence of the secret
messages? Notice how the goal of steganography is different from classical encryption,
which seeks to conceal the content of secret messages: Steganography is about hiding the
very existence of the secret messages.
we use techniques from cryptography and complexity theory to answer the question
“under what conditions is (secure) steganography possible?” We give cryptographic
definitions for symmetric-key stegosystems and steganographic secrecy against a passive
adversary in terms of indistinguishability from a probabilistic channel process.
        We show that a widely believed complexitytheoretic assumption (the existence of
a one-way function) and access to a channel oracle are both necessary and sufficient
conditions for the existence of secure steganography relative to any channel. We
furthermore give a construction that has essentially optimal bandwidth when compared
with known provably secure constructions. Finally, we consider the question of robust
steganography
that resists attempts to censor the use of a covert channel; we prove necessary and
sufficient conditions for the existence of a secure robust stegosystem and give a provably
robust stegosystem with nearly optimal bandwidth under attack.
Existing System:


       Classic problem of computer security is the mitigation of covert channels, a
covert channel in a (single-host or distributed) computer system can be roughly defined
as any means by which two processes or users can exchange information in violation of
security policy. While the exact detection of usable covert channels in a system is
undividable, many conservative approaches exist to detect and eliminate all potential
covert channels.


Proposed System:


       Focuses on the dual problem of steganography how can two communicating
entities send secret messages over a public or audited channel so that a third party such as
the reference monitor cannot detect the presence of the secret messages the goal of
steganography is different from classical encryption, which seeks to conceal the content
of secret messages. Steganography is about hiding the very existence of the secret
messages.


       We give a necessary condition on the amount of disruption the adversary is
allowed in terms of a worst case measure of mutual information. We give a construction
that is provably secure and computationally efficient and has nearly optimal bandwidth,
assuming repeatable access to the channel distribution


System configuration


Hardware Requirements:
Processor Type           : Pentium -IV
      Speed                        : 2.4 GHZ
      Ram                      : 512 MB RAM
      Hard disk                : 20 GB HD (Min)


Software Requirements:


      Operating System      : Win2000/XP/Linux
      Programming Package             : JAVA / J2EE.
      Tools                 : Eclipse.5.1
      SDK                   : JDK1.5.0.
      Server                   : Tomcat server 5.0



SYSTEM DESIGN
3.1 Design Overview




       Input-
       Video      Processing



                                         Stegnography
                      Reverse
                      Processing         Video+ Image
       Input-
       Image
Modules

 In this project we are having four modules for the video stegnograpgh

Modules:

   1.   Choosing the Input Files(Video and Image)
   2.   Stgenography processing
   3.   Reverse the Stegnography
   4.   Checking the Files after stegnography


Module 1: Choosing the Input Files(Video and Image)

        In this module user should select the input file as video and image file. Image file
size should be less that video file. After processing the these things will be in the separate
folder

Module 2: Stgenography processing



Module 3: Reverse the Stegnography



Module 4: Checking the Files after stegnography




If someone has decided to hide their data, they will probably be able to do so fairly
easily. The only way to detect steganography is to be actively looking for in specific files,
or to get very lucky. Sometimes an actively enforced security policy can provide the
answer: this would require the implementation of company-wide acceptable use policies
that restrict the installation of unauthorized programs on company computers.
Using the tools that you already have to detect movement and behavior of traffic on your
network may also be helpful. Network intrusion detection systems can help
administrators to gain an understanding of normal traffic in and around your network and
can thus assist in detecting any type of anomaly, especially with any changes in the
behavior of increased movement of large images around your network. If the
administrator is aware of this sort of anomalous activity, it may warrant further
investigation. Host-based intrusion detection systems deployed on computers may also
help to identify anomalous storage of image and/or video files.

Two methods of attacking steganography, which really are also methods of detecting it.
They are the visual attack (actually seeing the differences in the files that are encoded)
and the statistical attack: "The idea of the statistical attack is to compare the frequency
distribution of the colors of a potential stego file with the theoretically expected
frequency distribution for a stego file." It might not be the quickest method of protection,
but if you suspect this type of activity, it might be the most effective. For JPEG files
specifically, a tool called Stegdetect, which looks for signs of steganography in JPEG
files, can be employed. Stegbreak, a companion tool to Stegdetect, works to decrypt
possible messages encoded in a suspected steganographic file, should that be the path you
wish to take once the stego has been detected.

CONCLUSION AND FUTURE SCOPE

Steganography is a fascinating and effective method of hiding data that has been used
throughout history. Methods that can be employed to uncover such devious tactics, but
the first step are awareness that such methods even exist. There are many good reasons as
well to use this type of data hiding, including watermarking or a more secure central
storage method for such things as passwords, or key processes, video, audio..etc .
Regardless, the technology is easy to use and difficult to detect. The more that you know
about its features and functionality, the more ahead you will be in the game.
Multimedia

Weitere ähnliche Inhalte

Was ist angesagt?

A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 

Was ist angesagt? (18)

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Steganography
SteganographySteganography
Steganography
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
Steganography
SteganographySteganography
Steganography
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.
 
K0815660
K0815660K0815660
K0815660
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
ANURADHA_FINAL_REPORT
ANURADHA_FINAL_REPORTANURADHA_FINAL_REPORT
ANURADHA_FINAL_REPORT
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 

Andere mochten auch (7)

Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
Delay bounds of chunk based peer-to-peer
Delay bounds of chunk based peer-to-peerDelay bounds of chunk based peer-to-peer
Delay bounds of chunk based peer-to-peer
 
Communication cost minimization in wireless
Communication cost minimization in wirelessCommunication cost minimization in wireless
Communication cost minimization in wireless
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
Adaptation of Reputation Management Systems to Dynamic Network Conditions in ...
Adaptation of Reputation Management Systems to Dynamic Network Conditions in ...Adaptation of Reputation Management Systems to Dynamic Network Conditions in ...
Adaptation of Reputation Management Systems to Dynamic Network Conditions in ...
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Ns2leach
Ns2leachNs2leach
Ns2leach
 

Ähnlich wie Multimedia

11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 

Ähnlich wie Multimedia (20)

Steganography
SteganographySteganography
Steganography
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
F1803023843
F1803023843F1803023843
F1803023843
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
finl.docx
finl.docxfinl.docx
finl.docx
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 

Mehr von ambitlick

Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
ambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 

Mehr von ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 

Kürzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Multimedia

  • 1. Problem Definition A classic problem of computer security is the mitigation of covert channels. First introduced by Lampson , a covert channel in a (single-host or distributed) computer system can be roughly defined as any means by which two processes or users can exchange information in violation of security policy. While the exact detection of usable covert channels in a system is un decidable, many conservative. Approaches exist to detect and eliminate all potential covert channels; for example, the US Department of Defense “Light Pink Book” on covert channel analysis includes detailed procedures to find and eliminate covert channels. Unfortunately, the cost of such elimination is often prohibitive; in this case, the Light Pink Book recommends techniques to limit the bandwidth of covert channels and requires auditing to detect any use of the covert channel. Problem Identification This Project we focuses on the dual problem of steganography How can two communicating entities send secret messages over a public or audited channel so that a third party such as the reference monitor cannot detect the presence of the secret messages? Notice how the goal of steganography is different from classical encryption, which seeks to conceal the content of secret messages: Steganography is about hiding the very existence of the secret messages. we use techniques from cryptography and complexity theory to answer the question “under what conditions is (secure) steganography possible?” We give cryptographic definitions for symmetric-key stegosystems and steganographic secrecy against a passive adversary in terms of indistinguishability from a probabilistic channel process. We show that a widely believed complexitytheoretic assumption (the existence of a one-way function) and access to a channel oracle are both necessary and sufficient conditions for the existence of secure steganography relative to any channel. We furthermore give a construction that has essentially optimal bandwidth when compared with known provably secure constructions. Finally, we consider the question of robust steganography that resists attempts to censor the use of a covert channel; we prove necessary and sufficient conditions for the existence of a secure robust stegosystem and give a provably robust stegosystem with nearly optimal bandwidth under attack.
  • 2. Existing System: Classic problem of computer security is the mitigation of covert channels, a covert channel in a (single-host or distributed) computer system can be roughly defined as any means by which two processes or users can exchange information in violation of security policy. While the exact detection of usable covert channels in a system is undividable, many conservative approaches exist to detect and eliminate all potential covert channels. Proposed System: Focuses on the dual problem of steganography how can two communicating entities send secret messages over a public or audited channel so that a third party such as the reference monitor cannot detect the presence of the secret messages the goal of steganography is different from classical encryption, which seeks to conceal the content of secret messages. Steganography is about hiding the very existence of the secret messages. We give a necessary condition on the amount of disruption the adversary is allowed in terms of a worst case measure of mutual information. We give a construction that is provably secure and computationally efficient and has nearly optimal bandwidth, assuming repeatable access to the channel distribution System configuration Hardware Requirements:
  • 3. Processor Type : Pentium -IV Speed : 2.4 GHZ Ram : 512 MB RAM Hard disk : 20 GB HD (Min) Software Requirements: Operating System : Win2000/XP/Linux Programming Package : JAVA / J2EE. Tools : Eclipse.5.1 SDK : JDK1.5.0. Server : Tomcat server 5.0 SYSTEM DESIGN 3.1 Design Overview Input- Video Processing Stegnography Reverse Processing Video+ Image Input- Image
  • 4. Modules In this project we are having four modules for the video stegnograpgh Modules: 1. Choosing the Input Files(Video and Image) 2. Stgenography processing 3. Reverse the Stegnography 4. Checking the Files after stegnography Module 1: Choosing the Input Files(Video and Image) In this module user should select the input file as video and image file. Image file size should be less that video file. After processing the these things will be in the separate folder Module 2: Stgenography processing Module 3: Reverse the Stegnography Module 4: Checking the Files after stegnography If someone has decided to hide their data, they will probably be able to do so fairly easily. The only way to detect steganography is to be actively looking for in specific files, or to get very lucky. Sometimes an actively enforced security policy can provide the answer: this would require the implementation of company-wide acceptable use policies that restrict the installation of unauthorized programs on company computers.
  • 5. Using the tools that you already have to detect movement and behavior of traffic on your network may also be helpful. Network intrusion detection systems can help administrators to gain an understanding of normal traffic in and around your network and can thus assist in detecting any type of anomaly, especially with any changes in the behavior of increased movement of large images around your network. If the administrator is aware of this sort of anomalous activity, it may warrant further investigation. Host-based intrusion detection systems deployed on computers may also help to identify anomalous storage of image and/or video files. Two methods of attacking steganography, which really are also methods of detecting it. They are the visual attack (actually seeing the differences in the files that are encoded) and the statistical attack: "The idea of the statistical attack is to compare the frequency distribution of the colors of a potential stego file with the theoretically expected frequency distribution for a stego file." It might not be the quickest method of protection, but if you suspect this type of activity, it might be the most effective. For JPEG files specifically, a tool called Stegdetect, which looks for signs of steganography in JPEG files, can be employed. Stegbreak, a companion tool to Stegdetect, works to decrypt possible messages encoded in a suspected steganographic file, should that be the path you wish to take once the stego has been detected. CONCLUSION AND FUTURE SCOPE Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes, video, audio..etc . Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.