Ethical Hacking Project of Final Year
Ethical Hacking Project of Final Year
Ethical Hacking Project of Final Year
PROJECT ENTITLED
“Steganography with Steghide”
SUBMITTED BY
Miss.Vaishali Singh
UNDER GUIDANCE OF
Prof. Simran Shinde Ma’am
Submitted partial full fillment of the requirement for the third year
project of Bachelor in
Computer Science
2022-2023
CERTIFICATE
B.Sc. C.S. Semester VI has completed the project work in the Subject of
Guidance of Prof. Simran Shinde being the partial requirement for the
fulfillment of the curriculum of Degree of Bachelor of Science in Computer
Place:
Date:
I am Vaishali Singh student of Pillai College of Arts, Commerce & Science would
like to express my sincere gratitude towards Computer Science Department.
I would like to thank lecturer Prof. Simran Shinde Ma’am and for their constant
support during the project. Last but not least I thank all my classmates for being
with me throughout the project, which leads to a successful completion of my
project.
The project would not have been completed without creativity and energy, which
our friends provided.
Introduction
You can use steganography to hide text, video, images, or even audio
data. It’s a helpful bit of knowledge, limited only by the type of medium
and the author’s imagination.
Steganography Tools
Steghide: Steghide is a free tool that uses steganography to conceal information in other files,
such as media or text.
Stegosuite: It is a Java-based, free steganography tool. Stegosuite makes it simple to obfuscate
data in pictures for covert purposes.
OpenPuff: It is a high-quality steganographic tool that allows you to conceal data in other
media types like images, videos, and Flash animations.
Xiao Steganography: To conceal information in BMP images or WAV files, use the free Xiao
Steganography tool.
SSuite Picsel: The free portable program SSuite Picsel is yet another option for hiding text
within an image file; however, it uses a somewhat different method than other programs.
Advantages of Steganography
Install Kali
Successfully install kali Linux
After done we can see the image with slight or minor change in it
7) In order to see the file embed properly we have to check though extraction .
You can see Data successfully stored in secrets.txt file though same authentication.
CONCLUSION
Steganography can protect data by hiding it but using it alone may not guarantee total protection.
It is possible that by using a stenography technique, enemy defects presence of text message in
the image file and then he/she may succeed in extracting information from the picture, which can
be disastrous in real life situations. This is same for plain encryption. In this case by seeing the
meaningless appearing sequence of bits enemy can detect that some illegal message is being sent
(unless he/she is a fool), and we may land – up in a problematic situation. However, if one uses
both methods, this will lead to ‘security in depth’. The message should first be encoded using a
strong encryption algorithm and then embedded into a carrier.
THANKYOU