DOC PREVIEW
USC CSCI 530 - Stego Lab Handout

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CSCI 530 Lab 1Steganography Week assigned: 1/22 Week Due: 1/29Overview:Instructions:AssignmentCSCI 530 Lab 1SteganographyWeek assigned: 1/22Week Due: 1/29Overview:In this lab, students will get familiar with a popular steganography tool for Windows, S-Tools. Students will understand how to properly hide a file inside of another file. Students will also learn how to reveal information from a file. Students will also understand how the file can be corrupted and loose the data.Instructions:1. Hiding a file using S-Toolsa. Obtain the program S-Tools, either from the CSCI 530 Shared Folder on the Instructor drive, or from the CSCI530 Lab website.b. Open up S-Tools, after extracting the zip file.c. Open up the folder My Documents  My Pictures  Sample Picturesd. Double Click on the file Sunset.jpg to open the file using Microsoft Photo Editore. In Microsoft Photo Editor, go to File  Save As…Under Save as Type, select Windows Bitmap (.bmp), and select Save.f. Back to the folder, drag Sunset.bmp over to the S-Tools window. You will now see the picture in the S-Tools window.g. Go to Start  Run, and type in notepad in the run lineh. Type in any text that you want into notepad, for example, “This is a test of the steganography tool”i. Select Save, select the desktop on the left, and give the text file a name, such as test.txtj. Go to the Desktop, where the file test.txt is saved. Drag the file test.txt over the picture displayed in S-Tools.k. You will see a window saying “Hiding X Bytes”, where X is the size of the file. You will be asked for a passphrase, to verify the passphrase, and an encryption algorithm. Type “Password” for the passphrase, and select Triple DES for the algorithm.l. Another picture of the Sunset will appear, but with a title of “hidden data”.Right click on the image, and select save.m. Save the image as hidden_sunset.bmpn. You have now hidden a text file within a bitmap2. Revealing hidden text using S-Toolsa. Open S-Toolsb. Drag the picture with the hidden text message into the S-Tools window. Using the previous example, the file was hidden_sunset.bmpc. Right-Click on the picture, and select Reveald. It will ask for a passphrase, and an encryption algorithm. You must use theexact passphrase and encryption algorithm used above, or you will not be able to see the hidden message.e. It might take some time to reveal the hidden file, but once it does, you willsee a window that says “Revealed Archive”, with the file name and the size. Right-click on the file name, and select Save as…f. Save the file. When you open the saved file, you will see your exact text. 3. Seeing the limitations of Steganographya. Using the hidden file above (hidden_sunset.bmp), right click on the file, select open with, and select Microsoft Photo Editorb. Go to File  Save As…, and select JPEG as the file typec. Close Microsoft Photo Editor.d. Double Click on the file hidden_sunset.jpg, which should re-open Microsoft Photo Editore. Go to File  Save As…, and save the file as a bitmap (.bmp). Save the file with the name hidden_sunset2.bmpf. Now drag the file hidden_sunset2.bmp, and try to reveal the hidden text using the instructions above. AssignmentPerform all the steps above to demonstrate using steganography.In your lab report answer the following questions:1. Why were you not able to reveal the hidden text after converting the file to a .jpg, and then back to a .bmp?2. S-Tools uses a combination of Steganography and Cryptography (it encodes the file using an encryption algorithm. Are there cases where we want to use only oneor the other?3. Is it easy or difficult to detect Steganography? What techniques and/or tools are used to detect Steganography in a


View Full Document

USC CSCI 530 - Stego Lab Handout

Download Stego Lab Handout
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Stego Lab Handout and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Stego Lab Handout 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?