Youwill need an article from the SCSU Library for this assignment.
“Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues” by Warkentin and Vaughn.You will need chapter XVIII called Steganography and Steganalysis.
Read the chapter:chapter XVIII Steganography and Steganalysis
Provide an overview of the article:
Describe LSB Steganography:
Note: all details are in the Word doc. I also provided a sample.
IA 681
Name: ________________________________________
Assn 5 (10 points)
Date: __________________
Assignment 5.
STEGANOGRAPHY AND STEGANALYSIS
Save this file as a PDF with your First Initial Last Name and “Assn 5.PDF”. Example: Tim Cook
would save the files as “T Cook Assn 5.PDF”
Please complete the assignment on this paper (type your answers on this paper.) Use your own
words / don’t copy & paste. Remember to cite / list sources you used. Make sure to list your sources
when you use them (directly by the text) and at the end of the paper in a works cited section.
You will need an article from the SCSU Library for this assignment.
“Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues” by Warkentin and Vaughn. You will need chapter XVIII called Steganography and Steganalysis.
Here is what the Library mentioned about getting the article:
Hello. If the chapter is within the reserve item noted below, students would be able to submit digitization requests using the form available at https://scsu.mn/3dOhF8R.
Please let us know if you have any other questions.
Thanks!
St. Cloud State University Library
James W. Miller Learning Resources Center
320-308-3083
https://www.stcloudstate.edu/library
Read the chapter: chapter XVIII Steganography and Steganalysis
Provide an overview of the article:
Page 1 of 2
IA 681
Assn 5 (10 points)
Type it here….
Describe LSB Steganography:
Type it here….
It is often difficult and time consuming to detect steganography. What are some clues for a forensic
analyst to discover the presence of steganography? (might need some additional research / Google
searchers)
Type it here….
Visit https://www.spammimic.com/ / research the company
Describe what this website does:
Type it here….
Works cited:
Page 2 of 2
IA 681
Name: _______________________
Assn 5 (10 points)
Date:
Assignment 5.
STEGANOGRAPHY AND STEGANALYSIS
Save this file as a PDF with your First Initial Last Name and “Assn 5.PDF”. Example: Tim Cook
would save the files as “T Cook Assn 5.PDF”
Please complete the assignment on this paper (type your answers on this paper.) Use your own
words / don’t copy & paste. Remember to cite / list sources you used. Make sure to list your sources
when you use them (directly by the text) and at the end of the paper in a works cited section.
You will need an article from the SCSU Library for this assignment.
“Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues” by
Warkentin and Vaughn. You will need chapter XVIII called Steganography and Steganalysis.
Here is what the Library mentioned about getting the article:
Hello. If the chapter is within the reserve item noted below, students would be able to
submit digitization requests using the form available at https://scsu.mn/3dOhF8R.
Please let us know if you have any other questions.
Thanks!
St. Cloud State University Library
James W. Miller Learning Resources Center
320-308-3083
https://www.stcloudstate.edu/library
Page 1 of 3
IA 681
Assn 5 (10 points)
Read the chapter: chapter XVIII Steganography and Steganalysis
Provide an overview of the article:
The article aims at creating a more hands on approach towards learning computer security. It covers key
security principles and approaches that are important in modern world. The article focuses mainly on corporate
world and how to better secure businesses from security threats. Chapter 18 highlights the importance of
steganography and steganalysis in digital world. It defines the basics of steganography as a covered writing. In
essence, it is defined as any process that aims at concealing information or hiding data being sent. A brief
history of steganography is given and its application in modern world. Finally, steganalysis is briefly discussed
and how it is used to analyze the presence of hidden data.
Describe LSB Steganography:
LSB Steganography is a technique used in hiding messages whereby the messages are hidden inside an image.
This is achieved by replacing each pixel’s least significant bit with messages bits that are supposed to be
hidden. To be able to hide messages with this type of steganography, the following steps are followed:
–
Encoding the message into binary codes
–
Determining the length of encoded message
–
Adding the message and its length to the Pixel’s LSBs
To decode
–
Decode its length from the starting bits
–
Decode the pixels to determine the hidden message
It is often difficult and time consuming to detect steganography. What are some clues for a forensic
analyst to discover the presence of steganography? (might need some additional research / Google
searchers)
The messages in steganography are hidden from unauthorized users, therefore, it become difficult to detect it.
As a forensic analyst to detect steganography would require careful physical examination. These examinations
can entail the use of ultra violet light, magnification and chemicals for a physical document. For digital files,
Page 2 of 3
IA 681
Assn 5 (10 points)
steganalysis can come in handy. It entails the detection of steganographically encoded files. For a digital image,
one compare the suspected image with the original one. Discrepancy in file sizes or pixels can be one of the
clue.
Visit https://www.spammimic.com/ / research the company
Describe what this website does:
Spam mimic websites offers a tool that allows users to encrypt their messages, therefore, making it hard for it to
be intercepted. Additionally, it allows the creation of spam messages from short messages.
Works cited: http://www.spy-hunter.com/Steganography_V7.0_DefCon_V3_S.pdf
http://niels.xtdnet.nl/papers/detecting.pdf
Page 3 of 3
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more