You are given a text file of size 60 MB, which is to be encrypted using steganography
Question:
You are given a text file of size 60 MB, which is to be encrypted using steganography in the low-order bits of each color in an image file. What size image would be required in order to encrypt the entire file? What size would be needed if the file were first compressed to a third of its original size? Give your answer in pixels, and show your calculations. Assume that the images have an aspect ratio of 3:2, for example, 3000 × 2000 pixels.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 83% (12 reviews)
The number of bits to be encrypted is 60 10 6 8 480 10 6 bits Eac...View the full answer
Answered By
Somshukla Chakraborty
I have a teaching experience of more than 4 years by now in diverse subjects like History,Geography,Political Science,Sociology,Business Enterprise,Economics,Environmental Management etc.I teach students from classes 9-12 and undergraduate students.I boards I handle are IB,IGCSE, state boards,ICSE, CBSE.I am passionate about teaching.Full satisfaction of the students is my main goal.
I have completed my graduation and master's in history from Jadavpur University Kolkata,India in 2012 and I have completed my B.Ed from the same University in 2013. I have taught in a reputed school of Kolkata (subjects-History,Geography,Civics,Political Science) from 2014-2016.I worked as a guest lecturer of history in a college of Kolkata for 2 years teaching students of 1st ,2nd and 3rd year. I taught Ancient and Modern Indian history there.I have taught in another school in Mohali,Punjab teaching students from classes 9-12.Presently I am working as an online tutor with concept tutors,Bangalore,India(Carve Niche Pvt.Ltd.) for the last 1year and also have been appointed as an online history tutor by Course Hero(California,U.S) and Vidyalai.com(Chennai,India).
4.00+
2+ Reviews
10+ Question Solved
Related Book For
Question Posted:
Students also viewed these Computer science questions
-
Consider the following problems related to properties of filters. (a) Filters that operate under real-time conditions need to be causal, i.e., they can only process present and past inputs. When no...
-
Suppose you are given a sorted list of N elements followed by f (N) randomly ordered elements. How would you sort the entire list if a. f (N) = O(1)? b. f (N) = O(logN)? c. f (N) = O(N)? d. How large...
-
You are given a currency system with coins of (decreasing) value c1, c2, . . . , cN cents. a. Give an algorithm that computes the minimum number of coins required to give K cents in change. b. Give...
-
Introduction to Accounting An Integrated Approach EighthEdition Chapter 5 P5.10 P5.10 Engelhaupt Company is considering a switch to JIT. It has gathered the following data: In addition, Engelhaupt...
-
The W-2 incomes of Betty and her husband Ronald were $47,222 and $44,910, respectively. If Betty and Ronald use a filing status of married filing jointly, determine their tax liability using the tax...
-
Supply the missing dollar amounts for the 2017 statement of earnings of Ultimate Style Company for each of the following independent cases: Case A Case B Case D Case E Case C $ ? $ ? Sales revenue...
-
Describe the function of each branch of government.
-
Bower Corporation reported the following information: common stock, $1 par; 50,000 shares authorized; 35,000 shares issued and outstanding. Required: 1. What is the appropriate journal entry to...
-
Solve the system of linear equations, using the Gauss-Jordan elimination method. (If there is no solution, enter NO SOLUTION. If there are infinitely many solutions, express your answer in terms of...
-
Let f(x) be a pdf and let a be a number such that, for all > 0, f(a + ) = f(a - ). Such a pdf is said to be symmetric about the point a. (a) Give three examples of symmetric pdfs. (b) Show that if X...
-
The image of Fig. 8-54(b) contains the ASCII text of five plays by Shakespeare. Would it be possible to hide music among the zebras instead of text? If so, how would it work and how much could you...
-
An object has a force on it given by F = (4.75 N)i + (7.00 N)j + (3.50 N)k. (a) Find the magnitude of the force. (b) Find the projection of the force in the x-y plane. That is, find the vector in the...
-
A small lead sphere is encased in insulating plastic and suspended vertically from an ideal spring (k = 126N/m) above a table. Fig.16-63 the total mass of the coated sphere is 0.800kg, and its center...
-
A decrease in the intrinsic value of a fair value hedge is accounted for as a. A decrease of current earnings. b. Not recorded because the exchange transaction has not yet occurred. c. A decrease of...
-
On April 8, 20X3, Trul Corporation purchased merchandise from an unaffiliated foreign company for 10,000 units of the foreign companys local currency. Trul paid the bill in full on March 1, 20X4,...
-
According to ASC 815, which of the following is not an underlying? a. A security price. b. A monthly average temperature. c. The price of a barrel of oil. d. The number of foreign currency units.
-
According to ASC 815, for which of the following is hedge accounting not allowed? a. A forecasted purchase or sale. b. Available-for-sale securities. c. Trading securities. d. An unrecognized firm...
-
An entity denominated a December 15, 20X6, purchase of goods in a currency other than its functional currency. The transaction resulted in a payable fixed in terms of the amount of foreign currency...
-
Draw the influence line for the force in member CD. T 9ft 6 ft C D E 6 @ 9 ft = 54 ft F
-
Suppose that the laptop of Prob. 2.16 is placed in an insulating briefcase with a fully charged battery, but it does not go into sleep mode, and the battery discharges as if the laptop were in use....
-
Calculate the total time required to transfer a 1.5 MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 kB data, and an initial 2 RTT of handshaking before data are sent....
-
Calculate the total time required to transfer a 1000-kB file in the following cases, assuming an RTT of 100 ms, a packet size of 1 kB data, and an initial 2 RTT of handshaking before data are sent....
-
The Unix utility whois can be used to find the domain name corresponding to an organization or vice versa. Read the man page documentation for whois and experiment with it. Try whois princeton.edu...
-
Determine your monthly payment if you buy a $300,000 house at 6% with 15% down and pay it off over 30 years.
-
Revenue Recognition at a Point in Time versus Revenue Recognition Over Time. The market company won a contract to build a shopping center at a price of $300 million. The following schedule details...
-
Calculate the flat monthly instalment for the car loan amount of $450,000 over two years at 5% compounded semiannualy. You can use either geometric progression or an optimizer (Goal seek or Solver)...
Study smarter with the SolutionInn App