You are on page 1of 7

Tanmay Bhalerao D- batch

2016110004 Blue group

To provide confidentiality using


OpenPuff : A professional
steganography tool.
11/9/2021

Abstract: OpenPuff is a prevailing data hiding application made easy,


safe and free that allows you to hide data into encrypted files in order
to send it to other users. This application aims to protect both secret
messages and the persons who are exchanging messages.

OpenPuff is used primarily for anonymous asynchronous data sharing:


the sender hides a hidden stream inside some public available carrier
files (password + carrier files + carrier order are the secret key) the
receiver unhides the hidden stream knowing the secret key.
Experiment – 6

Aim: To provide confidentiality using OpenPuff : a professional


steganography tool.

Objective: Unlike cryptography that scrambles a message so that it


cannot be viewed, steganography hides the existence of the data. In
this lab, you will use OpenPuff to create a hidden message.

Observation:
 OpenPuff Tool interface:

1
 Using of password for secure encryption and decryption:
Here we can use 1-3 passwords for data encryption.

(In the above image I have used only one password. Note: if you are using only
one password you have to disable the b and c check box).

 Now we will add our data

2
 Now we will add a carrier mainly for decryption purpose

 It is important to match the bytes size of our data and carrier.

If the byte size of data does not matches the byte size of carrier then it will show
us a red coloured highlighted message.

3
 Our data is successfully hided

 Process of unhiding

 Select Unhide

4
 Enter the encryption password

 Give the same carrier we gave for encryption

 Now unhide
5
Conclusion:
 In this lab we saw the data encryption and decryption
 We used the software OpenPuff for our experimentation
 Initially the process was to create a password and encrypt our
data and set a carrier for that
 Next for decryption we have to use the same password and set
the same carrier. And our data will be saved to desired location
 One important point to note is that, we always have to set the
data and carrier byte size and if it does not matches or there is a
big gap between their byte size, our task will not move forward

You might also like