You are on page 1of 5

Network and Information Security (22620)

Practical No. 11: Use steganography to encode and decode the message using any
tool.
I Practical significance
Steganography is a technique that allows one to hide binary data within an image while adding few
noticeable changes. Steganography is the dark cousin of cryptography, the use of codes. While
cryptography provides privacy, steganography is intended to provide secrecy. Privacy is what you need
when you use your credit card on the Internet -- you don't want your number revealed to the public. For
this, you use cryptography, and send a coded pile of gibberish that only the web site can decipher. Though
your code may be unbreakable, any hacker can look and see you've sent a message. For true secrecy, you
don't want anyone to know you're sending a message at all.
II Relevant Program Outcome (POs)
PO1 – Basic knowledge
PO2 – Discipline knowledge

PO3 – Experiments and practice


PO4 – Life-long learning.

III Competency and practical Skills


“Use steganography to encode and decode the message using any
tool”
This practical is expected to develop the following skills:
1. We have to encode the message using steganography.
2. We have to decode the message using steganography.

IV Relevant Course Outcome(s)


Analyze the process of encoding and decoding the message using steganography.

V Practical outcomes
Given information about steganography.

VI Relevant Affective Domain Related Outcomes


a. Follow precautionary measures
b. Demonstrate working as a leader / a team member
c. Follow ethical practices

Page No : 1

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)
VII Minimum Theoretical Background
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are more
complex than others and all of them have respective strong and weak points. Different
applications may require absolute invisibility of the secret information, while others require a
large secret message to be hidden. This project report intends to give an overview of image
steganography, its uses and techniques.

VIII Work situation


a. Faculty must form a group of students.
b. Faculty will demonstrate the use of steganography.
c. Students group will encode and decode message using any tool of steganography.

IX Resources required (Additional)

SN Instrument/Object Specification Quantity Remarks

01 Desktop PC Processor i3/i5 1 / group Yes

02 Software Steghide 1 / group Yes

X Precaution to be followed
1. Handle computer system and peripherals with care
2. Use the software properly.
3. Follow safety precautions
4. Perform the encoding and decoding carefully.

Page No : 2

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)
XI Procedure
Steps to perform Backup and Restore Process:-
 Encryption process:
INFORMATIONFILE BMPFILE

IMAGE FILE

 Decryption process:
BMP FILE

INFORMATIONFILE IMAGEFILE

Fig-3
To send a message, a source text, an image in which the text should be embedded, and a key
are needed. The key is used to aid in encryption and to decide where the information should
be hidden in the image. Either another image or a short text can be used as a key. To receive
a message, a source image containing the information and the corresponding key are both
required. The result will appear in the text tab after decoding. Images should contain as many
colors as possible. It is also best if many of the colors are similar. At least 4 colors are required.
Microsoft .Net framework prepares a huge amount of tool and options for programmers that
they simples programming. One of .Net tools for pictures and images is auto-converting most
types of pictures to BMP format. I used this tool in this software called “Steganography” that
is written in C#.Net language and you can use this software to hide your information in any
type of pictures without any converting its format to BMP (software converts inside it.

Page No : 3

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)
XII Resources used (Additional)

XIII Observations

XIV Practical related Questions

1. Define Steganography?

2. Write the septs in short about encoding the message?

Page No : 4

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

3. Write steps in short about decoding the message?

List of student Team Members

1.
2.
3.
4.

Dated Signature ofTeacher

Page No : 5

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati

You might also like