Secret communication by using data hiding in IPv6

被引:0
|
作者
Carli, M. [1 ]
De Castro, A. [1 ]
Neri, A. [1 ]
机构
[1] Univ Rome TRE, Dept Appl Elect, Rome, Italy
来源
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VI | 2007年 / 6538卷
关键词
data hiding; internet protocol; security;
D O I
10.1117/12.720708
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper the use of Internet Protocol ver.6 packets to convey hidden information is exploited. The possibility to hide information in commonly used data transport mechanisms allows one to send extra information in a transparent way. The hidden message does not affect the routing mechanism neither interferes with the security mechanisms implemented on IP based networks, as firewalls, intrusion detection systems, authentication tools.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] IPv6: business applications and implementation concerns
    Cooper, M
    Yen, DC
    COMPUTER STANDARDS & INTERFACES, 2005, 28 (01) : 27 - 41
  • [42] The Web Services with security mechanisms base on IPv4 and IPv6
    Department of Computer Science and Engineering, Tatung University, Taipei City 10452, Taiwan
    Inf. Technol. J., 2008, 8 (1188-1193): : 1188 - 1193
  • [43] Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
    Saqer, Wesam
    Barhoom, Tawfiq
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (03) : 1013 - 1017
  • [44] A New Data Hiding Method for Protecting Bigger Secret Data
    Muttaqi, Syukron Rifa'il
    Ahmad, Tohari
    PROCEEDINGS OF 2019 12TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND SYSTEM (ICTS), 2019, : 146 - 151
  • [45] Reversible Data Hiding by Encrypting Secret Images using Hierarchical and Bit Shifting
    RoselinKiruba, R.
    Koushik, C. P.
    Shritharanyaa, J. P.
    Vasumathy, M.
    Jothi, C. Saranya
    Krishnammal, N.
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 501 - 506
  • [46] The Impact of Model S-Wane on IPv6
    Keita, Khadidiatou Wane
    Farssi, Sidi Mohamed
    Lishou, Claude
    Corenthin, Alex
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 1265 - 1268
  • [47] Performance analysis of probabilistic packet marking in IPv6
    Dang, Xuan-Hien
    Albright, Emil
    Abonamah, Abdullah A.
    COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3193 - 3202
  • [48] Lightweight Address Hopping for Defending the IPv6 IoT
    Aljosha, Judmayer
    Johanna, Ullrich
    Georg, Merzdovnik
    Artemios, Voyiatzis G.
    Edgar, Weippl
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [49] Implementing a secure AAA system in IPv6 network
    Meng, Fang
    An, Changqing
    Yang, Jiahai
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 172 - +
  • [50] Multi-addresses amplification DoS Attacks by native IPv6 and IPv6Tunnels
    Cui, Yu
    Zhang, Hongli
    Tian, Zhihong
    Fang, Binxing
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1594 - 1603