Survey and Design Approach of Protocol Steganography in IPv6

نویسندگان

  • Sandip Bobade
  • R. M. Goudar
  • Neil Johnson
  • Stefan Katzenbeisser
  • Wojciech Mazurczyk
  • Miosz Smolarczyk
  • Mohit Wadhwa
  • Manju Khari
چکیده

Steganography is the process of hiding message in another cover medium such that it is difficult to detect. Cover medium is used as a carrier. this carrier can be Image,video, text or IP packet. Covert Channel is implemented in different header Fields of IPv4 header to send secrete message. A covert channel is the medium that is used to transmit the information such as message, image or file. The fields flow label, traffic class and IPV6 source address of IPV6 header are selected as covert channel in this project. The more security in IPV6 header steganography can be achieved by applying cryptography ie Encryption. Public key algorithm i. e. RSA is selected for cryptography. Message is at first encrypted using RSA algorithm. The ciphertext is embedded in selected fields. Theses covert channels could be used for a Exploiting the Security rules so hidden Communication can be possible. this can be used for purpose such as pinching encryption key,login information or other secrets from in a way that should not easily detectable, but it could also be used for a good reason such as secret message can be passed under the watchful eyes of passive attacker. The demonstration of covert channel increases information security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High capacity steganography tool for Arabic text using 'Kashida'

Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...

متن کامل

A Survey on Quality of Service Provision in 4G Wireless Networks

Worldwide many mobile operators, industry experts, and researchers have diverse visions of potential 4 th generation (4G) features and its implementations. 4G networks will be incorporating advanced Internet Protocol version 6 (IPv6) protocol and the signaling will be done through Internet Protocol (IP). There are several key challenges in implementing 4G heterogeneous network. Few of these pro...

متن کامل

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

Reflections on Middlebox Detection Mechanisms in IPv6 Transition

Middleboxes performing Network Address Translation (NAT) have gained a positive role in the IPv6 transition by enabling interoperability of different IP versions, i.e., IPv4 and IPv6. Although the NAT-based mechanisms pave the way for a smooth adoption of IPv6 in the transition, we shall be prudent towards such middlebox-oriented approach due to its complexity and overhead for end users and net...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013