Steganography in IPv6
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
15-06-2010, 04:22 PM

Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered, it cannot be read. The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Steganalysis is the method of processing steganographyic data. There are two methods of detecting steganographically encoded data.

Visual Steganalysis

Statistical Steganalysis

In this project and implimentation, we want to embed the data in IPv6. We will focus on some of the loopholes in IPv6 and then try to ropose a novel algorithm for efficient data hiding.
IPv6 header - Possible Hidden Channels:

Source Address:

The 128-bit Source Address field contains the IPv6 address of the node originating the packet. IPv6 addresses are typically composed of two logical parts: a 64-bit (sub-network prefix), and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially.

Next Header:

The 8-bit Next Header field identifies the type of header immediately following the IPv6 header and located at the beginning of the data field (payload) of the IPv6 packet.


The 4-bit Priority field in the IPv6 header can assume 16 different values. It enables the source node to differentiate packets it generates by associating different delivery priorities to them. These 16 possible values are further divided into two groups: from 0 through 7 and from 8 through 15.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Enhanced Image Steganography Abstract seminar projects maker 0 415 19-09-2013, 03:40 PM
Last Post: seminar projects maker
Last Post: study tips
  Steganography With Region Based on Matching Method Report study tips 0 329 28-06-2013, 03:59 PM
Last Post: study tips
  Steganography implemented in Java science projects buddy 15 15,071 06-05-2013, 09:27 AM
Last Post: study tips
  FPGA Hardware of the LSB Steganography Method pdf study tips 0 541 20-04-2013, 04:10 PM
Last Post: study tips
  A Short Survey on Image Steganography and Steganalysis Techniques pdf study tips 0 407 27-02-2013, 12:50 PM
Last Post: study tips
  Steganography Application pdf study tips 0 387 25-02-2013, 03:18 PM
Last Post: study tips
  Online Voting System Powered By Biometric Security Using Steganography Report study tips 0 455 14-02-2013, 02:22 PM
Last Post: study tips
  Edge Adaptive Image Steganography Based on LSB Matching Revisited pdf study tips 0 404 14-02-2013, 09:39 AM
Last Post: study tips
  Stego Machine – Video Steganography using Modified LSB Algorithm pdf project girl 0 345 23-01-2013, 04:53 PM
Last Post: project girl