Steganography in IPv6
#1

Abstract:
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered, it cannot be read. The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing.
Steganalysis is the method of processing steganographyic data. There are two methods of detecting steganographically encoded data.

Visual Steganalysis

Statistical Steganalysis

In this project, we want to embed the data in IPv6. We will focus on some of the loopholes in IPv6 and then try to ropose a novel algorithm for efficient data hiding.
IPv6 header - Possible Hidden Channels:

Source Address:

The 128-bit Source Address field contains the IPv6 address of the node originating the packet. IPv6 addresses are typically composed of two logical parts: a 64-bit (sub-network prefix), and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially.

Next Header:

The 8-bit Next Header field identifies the type of header immediately following the IPv6 header and located at the beginning of the data field (payload) of the IPv6 packet.

Priority:


The 4-bit Priority field in the IPv6 header can assume 16 different values. It enables the source node to differentiate packets it generates by associating different delivery priorities to them. These 16 possible values are further divided into two groups: from 0 through 7 and from 8 through 15.
Reply
#2


to get information about the topic "steganography in audio files" full report ppt and related topic refer the page link bellow

http://studentbank.in/report-audio-stega...n-abstract

http://studentbank.in/report-steganography-in-ipv6

http://studentbank.in/report-audio-stega...e=threaded
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography in ipv6 pdf**, steganography in ipv6 in java, ipv6 steganography, steganography in ipv6 pdf, steganography in ipv6 ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Steganography implemented in Java science projects buddy 14 12,146 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  steganography full report project report tiger 31 33,690 07-07-2015, 02:57 PM
Last Post: seminar report asees
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,753 04-02-2013, 04:49 PM
Last Post: seminar details
  Audio Steganography project topics 3 6,520 10-11-2012, 11:58 AM
Last Post: seminar details
  IMAGE COMPRESSION AND STEGANOGRAPHY IN ADVANCED JPEG STANDARD seminar class 1 2,551 24-10-2012, 12:52 PM
Last Post: seminar details
  Steganography-A Modern Approach to Digital Security seminar class 1 2,062 13-02-2012, 05:02 PM
Last Post: seminar paper
  Steganography project topics 1 4,471 19-01-2012, 10:06 AM
Last Post: seminar addict
  New approach in steganography by integrating different LSB algorithms and applying ra seminar class 2 2,795 19-01-2012, 10:06 AM
Last Post: seminar addict
  Video Steganography project topics 4 5,210 19-01-2012, 10:06 AM
Last Post: seminar addict
  A DWT BASED APPROACH FOR STEGANOGRAPHY USING BIOMETRICS project topics 3 2,853 10-10-2011, 09:55 AM
Last Post: seminar addict

Forum Jump: