STEGANOGRAPHY AND STEGANALYSIS

Youwill need an article from the SCSU Library for this assignment.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

“Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues” by Warkentin and Vaughn.You will need chapter XVIII called Steganography and Steganalysis.

Read the chapter:chapter XVIII Steganography and Steganalysis

Provide an overview of the article:

Describe LSB Steganography:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Note: all details are in the Word doc. I also provided a sample.

IA 681
Name: ________________________________________
Assn 5 (10 points)
Date: __________________
Assignment 5.
STEGANOGRAPHY AND STEGANALYSIS
Save this file as a PDF with your First Initial Last Name and “Assn 5.PDF”. Example: Tim Cook
would save the files as “T Cook Assn 5.PDF”
Please complete the assignment on this paper (type your answers on this paper.) Use your own
words / don’t copy & paste. Remember to cite / list sources you used. Make sure to list your sources
when you use them (directly by the text) and at the end of the paper in a works cited section.
You will need an article from the SCSU Library for this assignment.
“Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues” by Warkentin and Vaughn. You will need chapter XVIII called Steganography and Steganalysis.
Here is what the Library mentioned about getting the article:
Hello. If the chapter is within the reserve item noted below, students would be able to submit digitization requests using the form available at https://scsu.mn/3dOhF8R.
Please let us know if you have any other questions.
Thanks!
St. Cloud State University Library
James W. Miller Learning Resources Center
320-308-3083
https://www.stcloudstate.edu/library
Read the chapter: chapter XVIII Steganography and Steganalysis
Provide an overview of the article:
Page 1 of 2
IA 681
Assn 5 (10 points)
Type it here….
Describe LSB Steganography:
Type it here….
It is often difficult and time consuming to detect steganography. What are some clues for a forensic
analyst to discover the presence of steganography? (might need some additional research / Google
searchers)
Type it here….
Visit https://www.spammimic.com/ / research the company
Describe what this website does:
Type it here….
Works cited:
Page 2 of 2
IA 681
Name: _______________________
Assn 5 (10 points)
Date:
Assignment 5.
STEGANOGRAPHY AND STEGANALYSIS
Save this file as a PDF with your First Initial Last Name and “Assn 5.PDF”. Example: Tim Cook
would save the files as “T Cook Assn 5.PDF”
Please complete the assignment on this paper (type your answers on this paper.) Use your own
words / don’t copy & paste. Remember to cite / list sources you used. Make sure to list your sources
when you use them (directly by the text) and at the end of the paper in a works cited section.
You will need an article from the SCSU Library for this assignment.
“Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues” by
Warkentin and Vaughn. You will need chapter XVIII called Steganography and Steganalysis.
Here is what the Library mentioned about getting the article:
Hello. If the chapter is within the reserve item noted below, students would be able to
submit digitization requests using the form available at https://scsu.mn/3dOhF8R.
Please let us know if you have any other questions.
Thanks!
St. Cloud State University Library
James W. Miller Learning Resources Center
320-308-3083
https://www.stcloudstate.edu/library
Page 1 of 3
IA 681
Assn 5 (10 points)
Read the chapter: chapter XVIII Steganography and Steganalysis
Provide an overview of the article:
The article aims at creating a more hands on approach towards learning computer security. It covers key
security principles and approaches that are important in modern world. The article focuses mainly on corporate
world and how to better secure businesses from security threats. Chapter 18 highlights the importance of
steganography and steganalysis in digital world. It defines the basics of steganography as a covered writing. In
essence, it is defined as any process that aims at concealing information or hiding data being sent. A brief
history of steganography is given and its application in modern world. Finally, steganalysis is briefly discussed
and how it is used to analyze the presence of hidden data.
Describe LSB Steganography:
LSB Steganography is a technique used in hiding messages whereby the messages are hidden inside an image.
This is achieved by replacing each pixel’s least significant bit with messages bits that are supposed to be
hidden. To be able to hide messages with this type of steganography, the following steps are followed:

Encoding the message into binary codes

Determining the length of encoded message

Adding the message and its length to the Pixel’s LSBs
To decode

Decode its length from the starting bits

Decode the pixels to determine the hidden message
It is often difficult and time consuming to detect steganography. What are some clues for a forensic
analyst to discover the presence of steganography? (might need some additional research / Google
searchers)
The messages in steganography are hidden from unauthorized users, therefore, it become difficult to detect it.
As a forensic analyst to detect steganography would require careful physical examination. These examinations
can entail the use of ultra violet light, magnification and chemicals for a physical document. For digital files,
Page 2 of 3
IA 681
Assn 5 (10 points)
steganalysis can come in handy. It entails the detection of steganographically encoded files. For a digital image,
one compare the suspected image with the original one. Discrepancy in file sizes or pixels can be one of the
clue.
Visit https://www.spammimic.com/ / research the company
Describe what this website does:
Spam mimic websites offers a tool that allows users to encrypt their messages, therefore, making it hard for it to
be intercepted. Additionally, it allows the creation of spam messages from short messages.
Works cited: http://www.spy-hunter.com/Steganography_V7.0_DefCon_V3_S.pdf
http://niels.xtdnet.nl/papers/detecting.pdf
Page 3 of 3

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER