CFP last date
22 April 2024
Reseach Article

A Research Paper on Steganography in IPV6

by Lalit Mohan Joshi, Amit Yadav, Sumit Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 14
Year of Publication: 2015
Authors: Lalit Mohan Joshi, Amit Yadav, Sumit Sharma
10.5120/21767-5020

Lalit Mohan Joshi, Amit Yadav, Sumit Sharma . A Research Paper on Steganography in IPV6. International Journal of Computer Applications. 122, 14 ( July 2015), 14-18. DOI=10.5120/21767-5020

@article{ 10.5120/21767-5020,
author = { Lalit Mohan Joshi, Amit Yadav, Sumit Sharma },
title = { A Research Paper on Steganography in IPV6 },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 14 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number14/21767-5020/ },
doi = { 10.5120/21767-5020 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:31.796181+05:30
%A Lalit Mohan Joshi
%A Amit Yadav
%A Sumit Sharma
%T A Research Paper on Steganography in IPV6
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 14
%P 14-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the process to hide a secret message such that it is very difficult to detect the presence of secret message presence. On other way, the existence of secret message is hidden. A covert channel may refer to the actual medium that is used to communicate the information such as a message, image as well as file. This project uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages can be passed from one party to another. A fully functional computer program was designed and written that transparently embeds messages into the source address fields of packets and across IPv6 networks, embedded messages are by these packets. This demonstrates the covert channel possibility within a default Internet protocol. For a malicious purpose such as stealing encryption passwords as well as keys or other secrets from remote hosts in a sequence not easily detectable this channel is used, but it may be used for a noble cause such as secretly passing messages under the watchful eyes of an oppressive regime. The covert channel demonstration in itself the overall information security of society is increased by bringing awareness to the existence of such a steganographic medium

References
  1. B. Dunbar. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment, Sans Institute, 1
  2. .
  3. Christian. An Information-Theoretic Model for Steganography,Proceedings of 2nd Workshop on Information Hiding, MIT Laboratory for Computer Science. 1998.
  4. H. Wu, H. Wang, C. Tsaiand C. Wang, Reversible image steganographic scheme via predictive coding. 1 (2010), ISSN: 01419382, 35-43.
  5. J, Corporation, Steganography. http://www. webopedia. com/TERM/S/steganography. html. 2005.
  6. M. D. Swanson, B. Zhu and A. H. Tewfik, Robust Data Hiding for Images, IEEE Digital
  7. Signal Processing Workshop, University of Minnesota, September 1996 ( 37-40). N Ghoshal, J K Mandal . A steganographic scheme for colour image authentication (SSCIA), Recent Trends in Information Technology ICRTIT 2011 International Conference on (2011), 826-831.
  8. N. Johnson, Survey of Steganography Software, Technical Report, January 2002.
  9. N. Johnson, Digital Watermarking and Steganography: Fundamentals and Techniques , The Computer Journal. (2009)
  10. P. Fabien, J. Ross. Anderson, and Markus G. Kuhn. "Information Hiding – A Survey. " Proceedings of the IEEE, 87:7. 1062-1078. 1999.
  11. W, Peter. Disappearing Cryptography: Information Hiding: Steganography & Watermarking (second edition). San FranciLi, B. , Biswas, S. , & Blasch, E. P. (2007, 9-12 July 2007).
  12. Li, L. -d. , Guo, B. -l. , & Guo, L. (2008). Rotation, scaling and translation invariant image watermarking using feature points. The Journal of China Universities of Posts and Telecommunications, 15(2), 82-87. doi: 10. 1016/s1005-8885(08)60089-8
  13. Martin, A. , Sapiro, G. , & Seroussi, G. (2005). Is image steganography natural? Image Processing, IEEE Transactions on, 14(12), 2040-2050. doi: 10. 1109/tip. 2005. 859370
  14. Marvel, L. M. , Retter, C. T. , & Boncelet, C. G. , Jr. (1998, 4-7 Oct 1998). Hiding information in images. Paper presented at the Image Processing, 1998. ICIP98. Proceedings. 1998 International Conference on.
  15. McBride, B. T. , Peterson, G. L. , & Gustafson, S. C. (2005). A new blind method for detecting novel steganography. Digital Investigation, 2(1), 50-70. doi: 10. 1016/j. diin. 2005. 01. 003
  16. Min-Jen, T. , & Jung, L. (2011, 6-9 Nov. 2011). The quality evaluation of image recovery attack for visible watermarking algorithms. Paper presented at the Visual Communications and Image Processing (VCIP), 2011 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography IPV6 MAC Address IPV6 Model