Write a program that will hide a binary file

Assignment Help Programming Languages
Reference no: EM131719451

Programming Assignment

In the exciting world of information security, there is a practice where someone is able to hide data inside of another file. In recent years, agents have used this practice to hide sensitive documents within the bits of images in a way that nobody can tell something else is in there. This practice, called steganography, is used to hide data inside of other files in such a way that anyone looking at the file would never know something else is hidden inside.

Description -

In your third project, you will be writing a pair of steganography programs that will hide and extract data from images. There are two parts to this project:

First Part - In the first part, you will write a program (Stego) that will hide a binary file in a PGM formatted image. PGM files are grayscale images that encode each pixel as an 8-bit value, ranging between 0 (0x00) and 255 (0xFF). The value 0x00 represents a black pixel and 0xFF is a white pixel. The trick to hiding data inside of a picture is to change the least significant bit (LSB) of each pixel's byte. For example, if the original pixel has the value of 0xAE (10101110), we can encode a one in the LSB to turn it into 0xAF (10101111). The difference in color and brightness between a pixel with the value 0xAE and 0xAF is so tiny that a human would not see any difference! Steganography is hiding data in a way that you can't even tell anything is hidden in there.

In this first part of the project, you will be hiding a binary data file in the least significant bit of each byte of the PGM image. The binary file you are hiding is known as the payload, the original image is the cover, and the modified PGM image that contains your payload is called the stego image.

Second Part - In the second part of your project, you will write a program StegoExtract that will takethe stego image generated from the program you wrote for part one and extract the payload from it. Once the binary file is recovered, it will be identical to the original payload file.

Since we are working with binary data files for the payload, the type can be any file that will fit. As long as it is small enough, you can encode other images into this image, in addition to encoding text files.

Attachment:- Assignment Files.rar

Reference no: EM131719451

Questions Cloud

Risk manager for an acute-care hospital : You are the newly appointed risk manager for an acute-care hospital in Florida made up of 200 beds.
How a system could improve accuracy : How a system could improve accuracy? How the database would store the data compared to the current spreadsheet method?
Subject-training and development : List and explain the seven steps in the training design process, including what would happen if you failed to complete a step.
To balance transportation model : To balance a transportation model, it may be necessary to add both a dummy source and a dummy destination.
Write a program that will hide a binary file : CS262 Programming Assignment. First Part - In the first part, you will write a program (Stego) that will hide a binary file in a PGM formatted image
Discuss incredibly sophisticated and complex mini-universes : Even the most basic and primitive cells are incredibly sophisticated and complex mini-universes that defy explanation
Personalized power compared to leader with socialized power : Compare and contrast a leader with personalized power compared to a leader with socialized power.
Reduce risk in a new foreign market : What is the best legal structure to use to reduce risk in a new foreign market? i.e.(partnership, formation of local corporation, joint venture, acquisition
Discuss the long-term geologic fate of the red sea : What is the long-term geologic fate of the Red Sea, which separates Africa from Arabia

Reviews

len1719451

11/13/2017 2:04:05 AM

Message: Please help me to do this project (including extra credit). THE RUBRIC DETAILS (GRADING TABLE) WILL BE POSTED ON 27 BY MY TEACHER. Therefore, could you please finish it and correct it (if we miss some points in the grading)? NOTE: Follow all directions exactly so that we can test your code in combinations with our own versions of Stego and StegoExtract programs. After ending your typescript, move to the parent directory and use tar as normal to create an archive of your directory for submission. Submit your tar file on Blackboard.

len1719451

11/13/2017 2:03:57 AM

Instructions for Submission - Create a folder named Project3_username_labsection. Move your source code, all image files, and your Make file to this folder. Your image files should all be small (less than 256k in size). You only need to input one PGM image, however, you may have several output images. Use your typescript to show the session where you compile and run your code for various combinations of image and input files.

Write a Review

Programming Languages Questions & Answers

  Artificial intelligence include expert systems,neural n/w

Are there ethical concerns here? How about ethical concerns for gathering and using competitive intelligence?

  You can always add a compareto method to a class without

q1. you can always add a compareto method to a class without making it implement the comparable interface so why do you

  Write program which will ask user to enter last names

Write a program which will ask the user to enter last names of our candidates in class officer's president election and number of votes received each candidate.

  Suggest one network architecture

Suggest one network architecture. Suggest LAN and Wireless LAN (WLAN) wiring considerations. Recommend hardware options and costs. Suggest security considerations for: Firewall Antivirus software Recommend software options and costs.

  Deisgn class contains data fields for height and surfacearea

Deisgn a class named Rectangle that contains data fields for height width and surfaceArea and a method named computeSurfaceArea?

  Explaining law of diminishing returns

As computer word size gets larger and larger, there is a law of diminishing returns; speed of execution of application programs doesn't increase and may, in fact, decrease.

  Write a perl script code

Write a Perl script which uses the segment of code over and over again, and you are tired of repeatedly typing in this code. Which of the following must you do?

  Differentiating heavyweight and lightweight process

What is the difference between a heavyweight and a lightweight process? Give an example of where heavyweight processes are appropriate.

  Design a project to allow a student to access current grades

Design a project to allow a student to access current grades and/or create a "What-if" situation on a continuing basis to understand where they are at any given point in the semester.

  Utilizes a good design process and incorporates sequential

Your final project will be to analyze, design, and document a simple program that utilizes a good design process and incorporates sequential, selection and repetitive programming statements.

  Write a program to read the data from csv file

Write a program that will read the data from the CSV file into an ArrayList of State objects where each State object stores information about all County objects for that state.

  Create a multi-threaded competition

Create a multi-threaded competition

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd