Use steganography to effectively hide one file

Assignment Help Software Engineering
Reference no: EM13311538

Purpose: The goal of this lab is demonstrate one of the many ways that terrorists, hackers, or other criminals can covertly pass information within files on the Internet, Facebook, or other public forums. It is designed to raise awareness among network administrators and security officers so that they can acquire tools such as StegDetect or Camerashy that can look for hidden messages in images posted on corporate web servers.

Files needed: Quick Stego software by Quickcrypto.com and a very large bitmap file (.bmp).

Objective: Use steganography to effectively hide one file within another one such that the file system/operating system doesn't detect it.
1. Create a file on your desktop using Notepad that will be hidden in the image.
2. Identify a large image (.bmp file) that will be used as your "carrier" file to hide your other file in. If you don't have one, open up a .jpg file in Paint (Accessories) and save it as a bitmap file (.bmp). 
4. Record the file size of both bitmap.bmp file and your text document that you will hide in your carrier file.
5. Install Quick Stego onto your PC, a free download is available from: https://quickcrypto.com/free-steganography-software.html
6. After installing, Run the program by clicking on the icon.
7. Click on Open Image and find your carrier file.
8. Click on Text File and Open Text - find the document your created and click on it. The text that you want to hide should be present in the right-hand window.
9. Click on the Hide Text button. You will see a message at the bottom of the window that says "The text message is now hidden in image".
10. Click on Save Image and name it hiddenfile.bmp.
11. Open up hiddenfile.bmp by double-clicking on it. Can you tell that you have this file hidden within the other one?
12. Compare the original with the stego copy Is there a discernible difference in resolution? Is there a difference in file size?
13. Now Run the Quick Stego program again and open up the hiddenfile.bmp. Do you see the text?
14. Perform an MD5 hash on the two files (your original .bmp file before you embedded the file and hiddenfile.bmp that you hid the document in) using the Advanced Checksum Verifier (avcsi.exe - from https://www.irnis.net/ - demo software ) or HashCalc from LavaSoft (freeware) - are the hashes different?
15. Download and use Camerashy to attempt to analyze hiddenfile.bmp. Was it successful?

Questions to answer:

1) What tools can you locate on the Internet that can help you detect files hidden in other files?
2) Why did, or didn't, the file size differ between the original file and the file with the document hidden inside?
3) Were you able to successfully identify the file hidden in hiddenfile.bmp with Camerashy or another tool?

Reference no: EM13311538

Questions Cloud

The rms value of the line-to-line voltage : Consider a 3 phase 25 kVA, 440 V, 60 Hz ac generator operating at full load (that is, delivering its rated kVA) under balanced steady state conditions. The ac generator has 3 stator windings that output balanced 3 phase voltages. It is usual to..
What is the tangential acceleration of the bob : A pendulum bob of mass m is attached to a massless string of length L. If the bob is released from rest at a horizontal position, What is the tangential acceleration of the bob
Evaluate and analyse leadership : Critically evaluate and analyse leadership you have witnessed in specific situations and this means comparing concrete examples (what was said and what was done) to relevant theories and models, concepts and principles from the topics and textbook
Evaluate the energy required to heat : Calculate the energy required to heat 1.30 kg of ethane gas (C2H6) from 27.0°C to 78.0°C first under conditions of constant volume and then at a constant pressure of 2.00 atm.
Use steganography to effectively hide one file : Steganography Lab. Create a file on your desktop using Notepad that will be hidden in the image.
Why risk averse consumers pay premium for insurance : Why risk averse consumers pay premium for insurance to convert an uncertain outcome to a certain one?
Harry is hospitalized with bacterial pneumonia : Harry is hospitalized with bacterial pneumonia.
Explain how many of nuts would a 64kg person have to eat : The amount of nut burned was 0.9905g. How many of these nuts would a 64kg person have to eat to obtain enough energy to bike (racing)for 30min? The amount of bicycling (racing) is 0.127
What is the electromotive force induced in the loop : An infinitely long solenoid of radius 2.5cm and 100 turns/cm carries an initial current of 1 A. what is the electromotive force induced in the loop

Reviews

Write a Review

Software Engineering Questions & Answers

  Explain changes needed to implement the new functionalities

Analysing and designing the changes needed to implement the new functionalities in the sample solution. Before we can start the implementation we need to analyse the project and describe the changes we will be implementing

  Context level dfd to level 0 dfd to illustrate sub-systems

Explode Context level DFD to Level 0 DFD to illustrate sub-systems (processes). Level 0 DFD illustrates internal data stores and how data flows through processes.

  What information-gathering methods are most appropriate

what information-gathering methods are most appropriate to learn about requirements from reliable's own management staff and other employees? from client health-care organizations? from suppliers?

  Relationship between programming languages and applications

A corporation is about to start a new project but before they start they would like to implement a new filing system. They have employed a consulting corporation to advise them

  Convert codes and symbols

Given a string of numbers, recognize all of the substrings that form numbers that are divisible by 3. For example, applying the algorithm on the string 37540 should produce following substrings.

  Creating coding for excel

Create a code that would sum five cells and then round to either .00, .25, .50, or .75 depending upon what range the sum of the cells falls into.

  Solving linear equations and linear inequalities

Discuss briefly and explain software testing as a career path, what skills would be desirable for a software tester.

  Design user-s requirements specification for school

Design a user's requirements specification for the EasyDrive School of Motoring database system. Use a single major user view for the application (Director View)

  Pushdown automaton

A useless state in a pushdown automaton is never entered on any input string. Think about the problem of testing whether a pushdown automaton has any useless states.

  Challenges and difficulties of applying software metrics

How to execute software measurement? Write dwon challenges and difficulties of applying software metrics?

  Sketch diagram displaying how message-application-layer

Sketch a diagram displaying how message gets from Alice's host to Bob's host. Ensure to list series of application-layer protocols which are used to move message between two hosts.

  Draw flowchart to compute the sum of series

Draw a flowchart to calculate the sum of 3+6+9+....+36. Then code the problem using C++programming language. Draw a flowchart to print 3,6,9,....36 Then code the logic using C++ programming language

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd