Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Research Paper on Steganography in IPV6

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 14
Year of Publication: 2015
Authors:
Lalit Mohan Joshi
Amit Yadav
Sumit Sharma
10.5120/21767-5020

Lalit Mohan Joshi, Amit Yadav and Sumit Sharma. Article: A Research Paper on Steganography in IPV6. International Journal of Computer Applications 122(14):14-18, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Lalit Mohan Joshi and Amit Yadav and Sumit Sharma},
	title = {Article: A Research Paper on Steganography in IPV6},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {14},
	pages = {14-18},
	month = {July},
	note = {Full text available}
}

Abstract

Steganography is the process to hide a secret message such that it is very difficult to detect the presence of secret message presence. On other way, the existence of secret message is hidden. A covert channel may refer to the actual medium that is used to communicate the information such as a message, image as well as file. This project uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages can be passed from one party to another. A fully functional computer program was designed and written that transparently embeds messages into the source address fields of packets and across IPv6 networks, embedded messages are by these packets. This demonstrates the covert channel possibility within a default Internet protocol. For a malicious purpose such as stealing encryption passwords as well as keys or other secrets from remote hosts in a sequence not easily detectable this channel is used, but it may be used for a noble cause such as secretly passing messages under the watchful eyes of an oppressive regime. The covert channel demonstration in itself the overall information security of society is increased by bringing awareness to the existence of such a steganographic medium

References

  • B. Dunbar. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment, Sans Institute, 1
  • .
  • Christian. An Information-Theoretic Model for Steganography,Proceedings of 2nd Workshop on Information Hiding, MIT Laboratory for Computer Science. 1998.
  • H. Wu, H. Wang, C. Tsaiand C. Wang, Reversible image steganographic scheme via predictive coding. 1 (2010), ISSN: 01419382, 35-43.
  • J, Corporation, Steganography. http://www. webopedia. com/TERM/S/steganography. html. 2005.
  • M. D. Swanson, B. Zhu and A. H. Tewfik, Robust Data Hiding for Images, IEEE Digital
  • Signal Processing Workshop, University of Minnesota, September 1996 ( 37-40). N Ghoshal, J K Mandal . A steganographic scheme for colour image authentication (SSCIA), Recent Trends in Information Technology ICRTIT 2011 International Conference on (2011), 826-831.
  • N. Johnson, Survey of Steganography Software, Technical Report, January 2002.
  • N. Johnson, Digital Watermarking and Steganography: Fundamentals and Techniques , The Computer Journal. (2009)
  • P. Fabien, J. Ross. Anderson, and Markus G. Kuhn. "Information Hiding – A Survey. " Proceedings of the IEEE, 87:7. 1062-1078. 1999.
  • W, Peter. Disappearing Cryptography: Information Hiding: Steganography & Watermarking (second edition). San FranciLi, B. , Biswas, S. , & Blasch, E. P. (2007, 9-12 July 2007).
  • Li, L. -d. , Guo, B. -l. , & Guo, L. (2008). Rotation, scaling and translation invariant image watermarking using feature points. The Journal of China Universities of Posts and Telecommunications, 15(2), 82-87. doi: 10. 1016/s1005-8885(08)60089-8
  • Martin, A. , Sapiro, G. , & Seroussi, G. (2005). Is image steganography natural? Image Processing, IEEE Transactions on, 14(12), 2040-2050. doi: 10. 1109/tip. 2005. 859370
  • Marvel, L. M. , Retter, C. T. , & Boncelet, C. G. , Jr. (1998, 4-7 Oct 1998). Hiding information in images. Paper presented at the Image Processing, 1998. ICIP98. Proceedings. 1998 International Conference on.
  • McBride, B. T. , Peterson, G. L. , & Gustafson, S. C. (2005). A new blind method for detecting novel steganography. Digital Investigation, 2(1), 50-70. doi: 10. 1016/j. diin. 2005. 01. 003
  • Min-Jen, T. , & Jung, L. (2011, 6-9 Nov. 2011). The quality evaluation of image recovery attack for visible watermarking algorithms. Paper presented at the Visual Communications and Image Processing (VCIP), 2011 IEEE.