Question: Use any .wav file Assignment In this assignment, we will write code that hides secret messages (strings) in binary files. This is a technique known

 Use any .wav file Assignment In this assignment, we will write

code that hides secret messages (strings) in binary files. This is a

technique known as "steganography," which means hiding messages in "plain sight." Anyone

eavesdropping thinks you are just sharing an audio file, but there is

actually a secret message hidden inside We will use several classes that

have not been discussed in class: File, RandomAccessFile, and Files. It is

Use any .wav file

Assignment In this assignment, we will write code that hides secret messages (strings) in binary files. This is a technique known as "steganography," which means hiding messages in "plain sight." Anyone eavesdropping thinks you are just sharing an audio file, but there is actually a secret message hidden inside We will use several classes that have not been discussed in class: File, RandomAccessFile, and Files. It is good to practice learning about new classes. To learn about these three classes you should consult the Java 8 API documentation. Sections 10.3 and 10.5 of your textbook also contain information that may be useful We will be hiding our message in a.wav audio. This picture shows how it works Header 44Lencharacter long First Next character of Position of next 46 bytes message (int) character ofPosition of next message message character (long) The ".. "s in the picture indicate big chunks of data that we will not change. A.wav file begins with a header (usually 44 or 46 bytes). The header contains information about the data and includes things like the number of audio channels and how to interpret the data in the file. We will put information about our message into the file after the header. By hiding our message after the header, we will still be able to play the file; the only hint that our message is hidden there is that there will be some clicking noises added. Our message will be small compared to the size of the data so our secret will go (mostly) unnoticed. To make sure we do not corrupt the header, we will skip the first 50 bytes

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!