Team #3 - Lab 5-Data Hiding and Steganography

Team #3 - Lab 5-Data Hiding and Steganography - Report Lab...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Report Lab #5 – Data Hiding and Steganography Completed by Team 3 – Ron Stellabotte – rjs5125@psu.edu, 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10/23/2010
Background image of page 2
Table of Contents 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Executive Summary Steganography has been used for years to hide information in within digital file. One of the more difficult to detect is steganography done with information hidden within image files. We found this Lab #5 very challenging and ran into a few walls trying to get the data from the files. The software did not work as we had expected and we were unable to complete a portion of the lab due to these difficulties. A software for this type of evidence recovery should be documented better than what we were able to find. We were able to correct the file extensions to open the file in their original format using XVI32. Section I: The Analysis Questions Q1.1: Three types of files could contain graphics: bitmap, vector and metafile that combines bitmap and vector. Standard vector image file formats include Hewlett Packard Graphics Language (.hpgl) and Autocad (.dxf); non-standard image file formats include .tga, .rtl, .psd etc. Please search the Web for standard bitmap formats, and record their first two bytes via xvi32. Format First 2 Bytes .bmp 42 4D 4
Background image of page 4
.gif 47 49 .jpg or .jpeg FF D8 .tif or .tiff 49 49 .png 89 50 Q 2.1: Please explain the weakness of stegbreak as a steganograph tool according to your experience in task 2. Stegbreak’s weakness comes from the fact that you have to provide the document with the words to run the dictionary attack on it. It would be more convenient if Stegbreak would have a list of all the words within the
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/10/2010 for the course IST 454 at Pennsylvania State University, University Park.

Page1 / 8

Team #3 - Lab 5-Data Hiding and Steganography - Report Lab...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online