Data masking: a secure-covert channel paradigm

نویسندگان

  • Regunathan Radhakrishnan
  • Kulesh Shanmugasundaram
  • Nasir D. Memon
چکیده

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganography called data masking. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganography, we process the entire secret message using an inverse Wiener filter to make it look like a multimedia object itself. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted communication channels. We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert attention enhances letter identification without affecting channel tuning.

Directing covert attention to the target location enhances sensitivity, but it is not clear how this enhancement comes about. Knowing that a single spatial frequency channel mediates letter identification, we use the critical-band-masking paradigm to investigate whether covert attention affects the spatial frequency tuning of that channel. We find that directing attention to the target location...

متن کامل

Data Masking: A New Approach for Data Hiding?

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganograp...

متن کامل

Data Masking: A New Approach for Steganography?

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia steganograp...

متن کامل

Verified Order-Based Transaction Scheduling Scheme for Multilevel Secure Database Management Systems

While the secure transaction schedulers in multilevel secure database systems synchronize transactions cleared at different security levels, they must consider the problem of covert channel. Through the covert channel, malicious users leak secret information in a way of intentional interference among the transactions that they invoked. Much work had been done for closing the covert channel. Alt...

متن کامل

Enhancing Security in Cloud Access Mechanism by Establishing Covert Storage Channel

Moving computing into the “Cloud” makes computer processing much more convenient for users but also presents them with new security problems about safety and reliability. While accessing the data we follow a data policy known by third party. They can use our data. So to overcome this problem we purpose a new scheme that makes use of the covert channel technique to secure the data being communic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002