Computer Security coursework 1 Dr Alexei Vernitski.

Slides:



Advertisements
Similar presentations
MUC Coursework 2011 Android Project. App description Create a life-logging app –use the phone as sensor to capture human experiences –create a digital.
Advertisements

Computer Security coursework 3 (part 2) Dr Alexei Vernitski.
The Assembly Language Level
IT151: Introduction to Programming
Files Introduction to Computing Science and Programming I.
01 Introduction1June Introduction CE : Fundamental Programming Techniques.
Revisions If you received the grade: “R” If you received the grade: “R” You must do a revision to receive a grade for lab 2. You must do a revision to.
Decisions in Python Comparing Strings – ASCII History.
Using Turnitin K. Robins and K. McCourt. Aims of Session To be aware of the benefits of using Turnitin for formative feedback; To be able to set up Turnitin.
Recitation 1 Programming for Engineers in Python.
1 Project 7: Huffman Code. 2 Extend the most recent version of the Huffman Code program to include decode information in the binary output file and use.
Aloha Aloha What you see: What the computer sees: binary number columns binary number columns
Introduction to Python
Data Representation S2. This unit covers how the computer represents- Numbers Text Graphics Control.
A First Program CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington Credits: a significant part of.
Chapter 2 Computer Hardware
CS 1150 – Lab #3 – Representing Numbers TA – Sanjaya Wijeratne – Web Page -
1 Agenda Administration Background Our first C program Working environment Exercise Memory and Variables.
Computer Security coursework 2 Dr Alexei Vernitski.
COMP 171: Principles of Computer Science I John Barr.
Downloading and Installing Autodesk Revit 2016
Chapter 2: Java Fundamentals
SE-1021 Software Engineering II Week 8, Class 1 Return Exam Producing UML diagrams automatically in EA Poll Everywhere Files Tomorrow Week 6 HW due (if.
CS 1150 – Lab #3 – Representing Numbers TA – Sanjaya Wijeratne – Web Page -
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
1 Computer Science of Graphics and Games MONT 105S, Spring 2009 Session 1 Simple Python Programs Using Print, Variables, Input.
CS2910 Week 1, Class 2 Today Announce Prof. Michael Vieau’s S-341 6p Thurs Wk 2 Assignment for tomorrow Data Encoding, Part 1 Parsing Data Muddiest Point.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Step 1. StrengthsQuest Assignment StrengthsQuest & Optimal Portfolio *
When you first log in, this is the page you will see. It lists all the courses you’re enrolled in – and differentiates between those that are active and.
OCR Computing GCSE © Hodder Education 2013 Slide 1 OCR GCSE Computing Python programming 4: Writing programs.
Computer Security coursework 3 (part 1) Dr Alexei Vernitski.
Homework #2: Functions and Arrays By J. H. Wang Mar. 20, 2012.
Introduction to Python Dr. José M. Reyes Álamo. 2 Three Rules of Programming Rule 1: Think before you program Rule 2: A program is a human-readable set.
Sequencing The most simple type of program uses sequencing, a set of instructions carried out one after another. Start End Display “Computer” Display “Science”
Project 3: Ticket Printer
A First Program CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington Credits: a significant part of.
12.2C: Project (Design/Implementation). Lesson objectives O have experience of using prototyping to create solutions for project work O be aware of the.
COMP1927 Course Introduction 16x1

Dr. Sajib Datta CSE Spring 2016 INTERMEDIATE PROGRAMMING.
1 Project 3 String Methods. Project 3: String Methods Write a program to do the following string manipulations: Prompt the user to enter a phrase and.
Binary 101 Gads Hill School. Aim To strengthen understanding of how computers use the binary number system to store information.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Characters and Strings
Computer Security coursework 3 Dr Alexei Vernitski.
1 Project 2: Sorting Cats. Write a C++ console application to read a text file containing information about cats and output the information to the screen.
COMPUTER PROGRAMMING Year 9 – Unit 9.04 Week 3. Open the Python INTERPRETER Can you use the interpreter to solve these maths problems? 156 add
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
1 Project 4: Palindrome Detector. 2 Assignment Write a C++ program that reads a line of text from the keyboard and reports to the user whether the text.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
+ Auto-Testing Code for Teachers & Beginning Programmers Dr. Ronald K. Smith Graceland University.
Homework Drop Box on eChalk.  Step 1 – Create Homework Assignment  Step 2 - Students Submit Homework Assignments  Step 3 - Teacher Reviews Homework.
Introduction to Programming
Steganography Example
Introduction to Programming
The Development Environment and Your First C Program
Introduction to Programming
Data Representation ASCII.
Learning to Program in Python
SE-1021 Software Engineering II
The backslash is used to escape characters that are used in Python
Create PT: Complete the Task
Flight prices.
Introduction to Programming
Learning Intention I will learn how computers store text.
SE-1021 Software Engineering II
Lab # 5 Detecting and reading barcodes
Marking Assignments in vUWS
Presentation transcript:

Computer Security coursework 1 Dr Alexei Vernitski

Aims of the coursework Learn more about: – bits and bytes – bit operations (also known as Boolean operations) – files – arrays of bytes – codes (such as ASCII) – digital steganography All this is useful not only for understanding computer security, but for any career in information technology

A picture with hidden text Download the picture file from the module’s web site The text is a poem about a ship (not a complete poem, but as many characters of it as have fitted within the picture).

Where is the text hidden? In the original text, each character (for example, a letter) occupies one byte I split the text into fragments of 2 bits each I took a picture of a flower I placed each 2-bit fragment of the text in 2 least significant bits of each byte of the picture file (excluding the header of the file)

Your task Extract the text hidden in the picture

What to submit? Submit just one file with your source code It will help me if you include your name and registration number in a comment within the code

What does your code need to do exactly? 1.Read everything from the picture file 2.Ignore the header of the file 3.Extract the last two bits from each byte 4.Reassemble the two-bit fragments into bytes of the hidden text 5.Output the text (either print it on the screen or save it to a text file, whichever is easier)

How shall I mark? I shall run your code and see if it extracts correctly the text that I have hidden in the file. If it does, you get 100%. If it does not, I shall look at the code and allocate some partial marks according to the list on the previous slide.

Programming I attempted the coursework and wrote my solution in Python – My complete code contains less than 15 lines – It took me approximately 20 minutes to write it – You may need up to 4 hours to complete the assignment if you need to learn how to open files in Python, how to perform bitwise operations in Python etc.

Labs Before the submission date of each piece of coursework, we shall have a lab on Monday The purpose of the lab is: – to help you to write your code, in case you have any difficulties – to give you an opportunity to demonstrate your code to me

No collaboration This is an individual assignment I shall look for signs of collaboration and plagiarism