Steganography in IPv6
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#1
15-06-2010, 04:22 PM


Abstract:
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered, it cannot be read. The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Steganalysis is the method of processing steganographyic data. There are two methods of detecting steganographically encoded data.

Visual Steganalysis

Statistical Steganalysis

In this project and implimentation, we want to embed the data in IPv6. We will focus on some of the loopholes in IPv6 and then try to ropose a novel algorithm for efficient data hiding.
IPv6 header - Possible Hidden Channels:

Source Address:

The 128-bit Source Address field contains the IPv6 address of the node originating the packet. IPv6 addresses are typically composed of two logical parts: a 64-bit (sub-network prefix), and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially.

Next Header:

The 8-bit Next Header field identifies the type of header immediately following the IPv6 header and located at the beginning of the data field (payload) of the IPv6 packet.

Priority:


The 4-bit Priority field in the IPv6 header can assume 16 different values. It enables the source node to differentiate packets it generates by associating different delivery priorities to them. These 16 possible values are further divided into two groups: from 0 through 7 and from 8 through 15.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Enhanced Image Steganography Abstract seminar projects maker 0 406 19-09-2013, 03:40 PM
Last Post: seminar projects maker
  TEXT FILE HIDING IN AUDIO FILE USING LOW BIT ENCODING STEGANOGRAPHY FULL REPORT study tips 0 482 16-07-2013, 04:35 PM
Last Post: study tips
  Steganography With Region Based on Matching Method Report study tips 0 319 28-06-2013, 03:59 PM
Last Post: study tips
  Steganography implemented in Java science projects buddy 15 15,062 06-05-2013, 09:27 AM
Last Post: study tips
  FPGA Hardware of the LSB Steganography Method pdf study tips 0 539 20-04-2013, 04:10 PM
Last Post: study tips
  A Short Survey on Image Steganography and Steganalysis Techniques pdf study tips 0 407 27-02-2013, 12:50 PM
Last Post: study tips
  Steganography Application pdf study tips 0 379 25-02-2013, 03:18 PM
Last Post: study tips
  Online Voting System Powered By Biometric Security Using Steganography Report study tips 0 450 14-02-2013, 02:22 PM
Last Post: study tips
  Edge Adaptive Image Steganography Based on LSB Matching Revisited pdf study tips 0 399 14-02-2013, 09:39 AM
Last Post: study tips
  Stego Machine – Video Steganography using Modified LSB Algorithm pdf project girl 0 339 23-01-2013, 04:53 PM
Last Post: project girl