Step 1 | Choose a carrier medium for the hidden message. This could be an image, audio file, video file, or another type of digital file. For this exercise, you will be working with an image.
Download the photo from the following link. https://en.wikipedia.org/wiki/File:Journal.pone.0138352.g001A.jpg
Links to an external site.
Rename the file with your first name initial and full last name (i.e., dfavors.jpg)
What is the size of the file?
Step 1. Use the link to download the image naming the file first initial last name.
Step 2 | Select a steganographic algorithm to use for embedding the hidden message into the carrier medium. This should be an appropriate algorithm for the type of file you are using as the carrier medium (an image).
Visit Steganography Online at https://stylesuxx.github.io/steganography/
Links to an external site.
Encode the Message by pressing the “Choose File” button and upload the photo that you named.
Step 3 | Create the hidden message that you want to embed into the carrier medium. This could be a text message, image, audio file, or another type of digital file. For this exercise, you will be utilizing your Module 9 Reflection Paper text.
In the text box “Enter your message here” copy and paste the text from your Module 9 Discussion Post.
Step 3. Select image and input text from your Module 9 reflection paper.
Step 4 | Use the chosen steganographic algorithm to embed the hidden message into the carrier medium. This process will typically involve modifying the digital bits of the carrier medium in a way that is not detectable to the naked eye.
Press the “encode” button
Right-click the last photo and “save the image as” your first name initial, and your full last name with an “s” at the end. (i.e., dfavorss)
Step 4. Right-click the last photo and “save the image as” your first name initial, your full last name with an “s” at the end. (i.e., dfavorss)
Step 5 | Once the hidden message has been embedded into the carrier medium, you can share the resulting file with the intended recipient.
What is the size of the file?
What file type of the file?
Step 6 | The recipient can then use a steganography decoder to extract the hidden message from the carrier medium. This typically involves applying the same steganographic algorithm that was used to embed the message in the first place.
Select the “Decode” tab at the top left side of the page under the title.
Step 7 | After the hidden message has been extracted from the carrier medium, it can be viewed or used by the recipient.
Select the “Choose File” button and upload the encoded file ending with “s.”
Is the message visible?
Screenshot this page and upload it as a document in the appropriate dropbox for assignment completion.
Step 7. Final screenshot for submission
Review the Grading Rubric
Links to an external site. (PDF) for details on how your report will be evaluated.
Assignment Submission Steps
Click on Module 9 | Steganography Exercise link within Module 9 or directly from within the Assignments tab on the course home menu.
Upload your screenshot image into the submission box.
Optionally, you may also type comments for your SME and facilitators to review regarding your submission.
Click Submit.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount