Unit 8: Steganography 8.3 Activity and Discussion Activity: Invisible Secrets
ACTIVITY: INVISIBLE SECRETS
Time: This activity should take you approximately 60 minutes to complete.
DOWNLOAD
Invisible Secrets is an easy-to-use encryption/steganography program. Invisible Secrets 4 is a commercial version that supports carriers of JPG, PNG, HTML, BMP and WAV. Invisible Secrets version 2.1 is a free edition that supports two types of carriers: JPG and BMP. You will use the free version to practice and understand how steganography tools encrypt, hide, and unhide payload.
Invisible Secrets 2.1 download
GOAL
Steganography tools are able to encrypt your payload data/image and hide it in innocent-looking digital images, sound files, or web pages. Our eyes are not good enough identify and detect the changes of the original files.
If you like to try more steganography tools, you can look into others listed in the Additional Resources section of this unit.
You may want to review the video Steganography Tool Demo before beginning this activity.
INSTRUCTIONS
Part 1: Hide your file
- Launch Invisible Secrets, then click Next.
- Choose Encrypt and/or Hide file(s) in a carrier file (the default option). Click Next.
- Browse and choose either a .jpg or a .bmp image as a carrier file. This image will hide your hidden data. If you check the Wipe carrier after process option, the carrier image will be deleted after the process is done. Click Next.
- Click the “Add files” tab. Browse and select the file you want to encrypt and hide into the carrier file. You can hide multiple files if you like. Click Next.
- Provide a password for encryption. This password will be used during unhide process. Click Next.
- Specify the name and location for the resulting covert image. Click Next.
- Click Finish to end the process.
You’re done! You can view the covert image, or send this image via e-mail or ftp.
Part 2: Extract the hidden data.
- In Invisible Secrets, select Extract and/or Decrypt file(s) from a carrier file. Click Next.
- Select the covert image you created. Click Next.
- Enter the same password you used in Step 5. Click Next.
- The hidden file(s) should be listed. Check the file you want to decrypt and unhide. Click Next.
- If you click on the “Explore Extracted Data” tab, you will be at the location where the extracted data resides.
- Click Finish and exit the program.
Answer the Check Your Work questions.