Use steganography to effectively hide one file

Assignment Help Software Engineering
Reference no: EM13311538

Purpose: The goal of this lab is demonstrate one of the many ways that terrorists, hackers, or other criminals can covertly pass information within files on the Internet, Facebook, or other public forums. It is designed to raise awareness among network administrators and security officers so that they can acquire tools such as StegDetect or Camerashy that can look for hidden messages in images posted on corporate web servers.

Files needed: Quick Stego software by Quickcrypto.com and a very large bitmap file (.bmp).

Objective: Use steganography to effectively hide one file within another one such that the file system/operating system doesn't detect it.
1. Create a file on your desktop using Notepad that will be hidden in the image.
2. Identify a large image (.bmp file) that will be used as your "carrier" file to hide your other file in. If you don't have one, open up a .jpg file in Paint (Accessories) and save it as a bitmap file (.bmp). 
4. Record the file size of both bitmap.bmp file and your text document that you will hide in your carrier file.
5. Install Quick Stego onto your PC, a free download is available from: https://quickcrypto.com/free-steganography-software.html
6. After installing, Run the program by clicking on the icon.
7. Click on Open Image and find your carrier file.
8. Click on Text File and Open Text - find the document your created and click on it. The text that you want to hide should be present in the right-hand window.
9. Click on the Hide Text button. You will see a message at the bottom of the window that says "The text message is now hidden in image".
10. Click on Save Image and name it hiddenfile.bmp.
11. Open up hiddenfile.bmp by double-clicking on it. Can you tell that you have this file hidden within the other one?
12. Compare the original with the stego copy Is there a discernible difference in resolution? Is there a difference in file size?
13. Now Run the Quick Stego program again and open up the hiddenfile.bmp. Do you see the text?
14. Perform an MD5 hash on the two files (your original .bmp file before you embedded the file and hiddenfile.bmp that you hid the document in) using the Advanced Checksum Verifier (avcsi.exe - from https://www.irnis.net/ - demo software ) or HashCalc from LavaSoft (freeware) - are the hashes different?
15. Download and use Camerashy to attempt to analyze hiddenfile.bmp. Was it successful?

Questions to answer:

1) What tools can you locate on the Internet that can help you detect files hidden in other files?
2) Why did, or didn't, the file size differ between the original file and the file with the document hidden inside?
3) Were you able to successfully identify the file hidden in hiddenfile.bmp with Camerashy or another tool?

Reference no: EM13311538

Questions Cloud

The rms value of the line-to-line voltage : Consider a 3 phase 25 kVA, 440 V, 60 Hz ac generator operating at full load (that is, delivering its rated kVA) under balanced steady state conditions. The ac generator has 3 stator windings that output balanced 3 phase voltages. It is usual to..
What is the tangential acceleration of the bob : A pendulum bob of mass m is attached to a massless string of length L. If the bob is released from rest at a horizontal position, What is the tangential acceleration of the bob
Evaluate and analyse leadership : Critically evaluate and analyse leadership you have witnessed in specific situations and this means comparing concrete examples (what was said and what was done) to relevant theories and models, concepts and principles from the topics and textbook
Evaluate the energy required to heat : Calculate the energy required to heat 1.30 kg of ethane gas (C2H6) from 27.0°C to 78.0°C first under conditions of constant volume and then at a constant pressure of 2.00 atm.
Use steganography to effectively hide one file : Steganography Lab. Create a file on your desktop using Notepad that will be hidden in the image.
Why risk averse consumers pay premium for insurance : Why risk averse consumers pay premium for insurance to convert an uncertain outcome to a certain one?
Harry is hospitalized with bacterial pneumonia : Harry is hospitalized with bacterial pneumonia.
Explain how many of nuts would a 64kg person have to eat : The amount of nut burned was 0.9905g. How many of these nuts would a 64kg person have to eat to obtain enough energy to bike (racing)for 30min? The amount of bicycling (racing) is 0.127
What is the electromotive force induced in the loop : An infinitely long solenoid of radius 2.5cm and 100 turns/cm carries an initial current of 1 A. what is the electromotive force induced in the loop

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd