Final Report Internship
Final Report Internship
Submitted by:
TEJASWINI H 4JN21CS174
JULY 2024
i
National Education Society ®
CERTIFICATE
This is to certify that the six week Innovative/Entrepreneurship Internship Report entitled.
Student of 6th semester B.E under the supervision and guidance towards the partial
fulfillment of the requirement for award of degree of the Bachelor of Engineering in
Computer Science And Engineering of Visvesvaraya Technological University, Belagavi
during the year 2023– 2024.
Signature of HOD
i
i
Certificate of Completion
awarded to
TEJASWINI.H
for successfully completing 6 weeks internship using IBM SkillsBuild in
Cyber Security (CS)
From October 13, 2023 to Nov 26, 2023.
This program was conducted in collaboration with All India Council for Technical
It gives us great pleasure in placing on record a deep sense of gratitude to our guide Mr.
Narendra Kumar S, Assistant Professor, Dept. of CS&E, and Dr. Jalesh Kumar, Head of the
Department, Dept. of CS&E, for their guidance, initiative and encouragement that led us through
internship. I would extend my heartfelt thanks to Dr. Y. Vijaya Kumar the Principal, JNNCE,
Shivamogga for their kind support and encouragement.
Finally, we also would like to thank the whole teaching and non-teaching staff of Computer
Science And Engineering to our respective parents, friends, and well-wishers.
Thanking you,
Tejaswini H (4JN21CS174)
ii
ABSTRACT
Steganography is a technique used to conceal text within an image, making the
information invisible to unintended recipients. This method involves embedding a secret
message into a digital image in such a way that it remains undetectable to the naked eye
and unsuspecting observers. The process typically involves manipulating the least
significant bits (LSBs) of the image's pixel values, which allows the text to be hidden
without significantly altering the appearance of the image. By embedding the message in
this manner, the steganography ensures that the cover image looks virtually identical to
the original image, thus protecting the confidentiality of the embedded information. The
applications of text-hiding steganography are vast, ranging from secure communication
and digital watermarking to protecting intellectual property. One of the key advantages
of this technique is that it can be applied to various types of images, such as JPEG, PNG,
and BMP formats, each offering different levels of resistance to compression and
distortion. Advanced algorithms enhance the security and robustness of the hidden
message, ensuring it can withstand common image processing operations. As a result,
steganography provides a discreet and effective way to transmit sensitive information,
making it a valuable tool in the fields of cybersecurity, digital forensics, and information
assurance.
i
Table of Contents
Abstract i
Acknowledgement ii
iii
List of Figures
i
v
Innovation/ Entrepreneurship Internship Report
Chapter-1
About the Industry
1.1 IBM Skill Build Program
The IBM SkillsBuild Program for Jobseekers was designed around three pillars of Self-Paced
Learning, Project-Based Learning, and Access to Employment. It is for this purpose IBM
SkillsBuild Program for Jobseekers has leveraged its expertise, credibility and track record
across the globe to build partnerships with governments both central and state. At a grassroot
level, Edunet as the implementation partner has not only facilitated these large partnerships but
has also collaborated with over 200 educational institutions to deliver the innovative program
to students and faculty members. These institutions range from Industrial Training Institutes
(ITIs) for training semi-skilled workers all the way to degree colleges and universities.
With IBM SkillsBuild for Jobseekers, students could gain core technology and
important workplace skills like: leadership skills, communication skills, programming skills,
problem solving skills, and/or writing skills that are aligned to in-demand jobs. Also, there lies
an opportunity to earn digital credentials to show employers what they’ve achieved.
IBM SkillsBuild is a free digital platform that gives every adult the opportunity to
develop technology and professional skills regardless of your background, education, or life
experiences.
To better prepare students for the professional journey, the partnership with AICTE and
IBM SkillsBuild brings Mentor-led Project Based Learning – Deep in the form of an 8 week
Virtual Internship.
Process
• The internship is delivered virtually to all students, over an 8 week duration from the
start date
• The internship is delivered in groups of students under a pre-selected problem
statement. Each of the 15 problem statements will be assigned a mentor along with 40-
60 students
• The mentor will introduce the problem statement, help brainstorm solutions and guide
students towards the technologies and skills required to solve the problem statement
• The internship concludes with the submission of the project and the delivery of a
presentation
• Top teams are awarded for their ingenuity, along with the internship completion
certificate and the remaining teams are provided Internship certificates
Topics
Virtual Internships are currently offered in the following topics
Figure 1.1 Various internships provided by IBM Skill Build with AICTE
Chapter-2
Skills Learnt
In the digital era, where nearly every aspect of our lives relies on interconnected systems,
cyber security skills have become indispensable. The ability to protect sensitive data, mitigate
cyber threats, and ensure the integrity of digital infrastructure is crucial for businesses,
governments, and individuals alike. This paper delves into the essential cyber security skills
across technical and non-technical domains, highlighting their significance and application in
today's complex cyber landscape. The scope of this report encompasses an in-depth
examination of cyber security skills, their practical application in an internship setting, and the
challenges faced by interns in developing these competencies. The objectives are to provide
interns with a comprehensive understanding of the skills necessary for a career in cyber security
and to offer insights into their application within organizational contexts.
Threat Landscapes: Cyber threats are diverse and constantly evolving. Understanding
the current threat landscape involves knowing the types of threats organizations face
(e.g., malware, social engineering, insider threats) and the tactics, techniques, and
procedures (TTPs) employed by attackers. This knowledge allows cyber security
professionals to prioritize defenses and allocate resources effectively.
Encryption Techniques: Encryption is crucial for protecting sensitive data in transit
and at rest. Knowledge of encryption algorithms (e.g., AES, RSA), cryptographic
protocols (e.g., TLS/SSL), and key management practices ensures that data remains
confidential and integrity is maintained.
Risk Assessment Methodologies: Risk assessment involves identifying and analyzing
vulnerabilities, threats, and potential impacts on organizational assets. Skills in risk
assessment methodologies (e.g., qualitative vs. quantitative risk assessment, risk
scoring models) enable professionals to prioritize security measures based on risk levels
and organizational priorities.
A solid understanding of these fundamentals forms the basis for developing and
implementing comprehensive cyber security strategies tailored to organizational needs.
Chapter-3
Learning Outcomes
3.1 Steganography
Steganogrphy is the art and science of concealing information within other, seemingly
innocuous data or media to ensure its secrecy and confidentiality. Unlike cryptography, which
focuses on making the content of a message unintelligible to unauthorized parties,
steganography aims to hide the very existence of the message.
Image Steganography: In image steganography, secret data is embedded into digital images
by subtly modifying the color values of pixels. Techniques such as Least Significant Bit (LSB)
insertion involve replacing the least significant bits of pixels with secret data bits without
noticeably altering the image's appearance. Other methods include masking and filtering
approaches that embed data in the frequency domain of the image, further concealing the
embedded information.
Audio and Video Steganography: Steganographic techniques can also be applied to audio and
video files. In audio steganography, imperceptible modifications can be made to audio samples
or frequencies to embed hidden messages. Video steganography involves manipulating video
frames or frames' attributes to hide information, utilizing similar principles of imperceptibility
to maintain the covertness of the embedded data.
Text Steganography: Even text can serve as a cover for steganographic messages. Techniques
may involve subtly altering spacing, punctuation, or word choice to encode hidden information.
For instance, using invisible ink or embedding messages within seemingly innocuous
documents through carefully selected fonts or formatting changes can effectively hide
information in plain sight.
Encryption Algorithm:
Step 1: Import Libraries
Step 2: Function Definition
Step 3: Load Image
Step 4: Get Pixel Data
Step 5: Convert Message and Password to Binary
Step 6: Concatenate Password and Message
Step 7: Check Message Length
Step 8: Embedding Process
Step 9: Create Encrypted Image
Step 10: Save Encrypted Image
Decryption Algorithm:
Step 1: Function Definition
Step 2: Load Encrypted Image
Step 3: Get Encrypted Pixels
Step 4: Extract Password from Image
Step 5: Extract Message from Image
Step 6: Convert Binary Message to Text
Step 7: Return Decrypted Password and Message
Step 8: Print the message
3.5 Results
Adaptability: The cyber security landscape is constantly evolving with new threats,
technologies, and regulations. Professionals must adapt quickly to changes, update their
skills and knowledge, and implement new security protocols effectively. Being
adaptable allows them to respond promptly to emerging threats and protect against
evolving cybersecurity risks.
Time Management and Prioritization: The ability to manage time effectively and
prioritize tasks is essential in cybersecurity, where incidents and threats require prompt
attention. Professionals must balance ongoing monitoring and maintenance tasks with
responding to urgent incidents and implementing proactive security measures.
Chapter-4
Conclusion
Steganography, the practice of concealing information within other non-secret data, stands as
a testament to the ingenuity of human communication across centuries and into the digital age.
Originally employed for covert communication in ancient Greece and during wartime, modern
steganography has found renewed relevance in digital media. By embedding messages within
images, audio files, or even text, steganography provides a subtle yet powerful means to
safeguard sensitive information from unauthorized access. However, this technique also raises
ethical concerns regarding its potential misuse for malicious purposes, such as cybercrime or
espionage. As technologies evolve, so do steganographic methods, challenging cyber security
professionals and law enforcement agencies alike to stay ahead in detecting and countering
such covert communications. Despite these challenges, steganography remains a vital tool in
digital forensics and data protection, highlighting its dual role in both safeguarding privacy and
posing challenges to security in the interconnected world of today.
References
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageSteganography.pdf
[5]. Deepak Singla, and Rupali Syal. "International Journal of Computational
Engineering
Research." Citeseerx.ist.psu.edu. N.p., Mar-Apr. 2012. Web.