Cart (Loading....) | Create Account
Close category search window
 

Network based packet watermarking using TCP/IP protocol suite

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

Watermarking is defined as the technique of embedding information in some cover. It takes one piece of information and embeds it within another. Mostly digital data is used for embedding. In this paper, we present a way to embed this digital information into the data packet. TCP/IP packets are transmitted over a network in large quantity. Within TCP/IP header there are number of fields that are not used for normal transmission or are "optional" to be set as needed by the sender of the packet. An analysis of the areas of a typical IP header fields that are either unused or optional reveals many possibilities where data can be stored and transmitted and this gives the intuition for finding free space within such packets. By embedding information in the options field of IP packet, we can make use of unused space of the IP header and can transmit our digital data within TCP/IP packets from sender to the receiver. One advantage of transmitting data in the header is that intruders will not have any idea that data is transmitted in the header, intruders will concentrate only on the payload of the packet. Encryption and compression however are optional in performing watermarking, but by making use of such techniques the security in the design can be incorporated. Challenges like loss of packets and many others are also handled in the design.

Published in:

Engineering (NUiCONE), 2011 Nirma University International Conference on

Date of Conference:

8-10 Dec. 2011

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.