|
@@ -245,11 +245,11 @@ Explain your answer.
|
245
|
245
|
---
|
246
|
246
|
|
247
|
247
|
|
248
|
|
-## Laboratory Session
|
|
248
|
+## Laboratory Session:
|
249
|
249
|
|
250
|
250
|
In today's laboratory experience, you will complete a steganography application to extract hidden messages from images.
|
251
|
251
|
|
252
|
|
-### Exercise 1 - Extract the binary message
|
|
252
|
+### Exercise 1 - Extract the Binary Message
|
253
|
253
|
|
254
|
254
|
#### Instructions
|
255
|
255
|
|
|
@@ -283,7 +283,7 @@ In today's laboratory experience, you will complete a steganography application
|
283
|
283
|
To implement the algorithm for extracting the message, you should understand how the message was encoded. If necessary, review the "Embedding a message into an image" section.
|
284
|
284
|
|
285
|
285
|
|
286
|
|
-### Exercise 2 - Interpreting the message
|
|
286
|
+### Exercise 2 - Interpreting the Message
|
287
|
287
|
|
288
|
288
|
#### Instructions
|
289
|
289
|
|
|
@@ -307,7 +307,7 @@ In today's laboratory experience, you will complete a steganography application
|
307
|
307
|
|
308
|
308
|
##Deliverables
|
309
|
309
|
|
310
|
|
-Use "Deliverable" in Moodle to upload the `steganography.cpp` file that contains the `ExtractMessage` and `binaryStringToMessage` functions. Remember to use good programming techniques, include the names of the programmers involved, and document your program.
|
|
310
|
+Use "Deliverable" in Moodle to upload the `steganography.cpp` file that contains the `ExtractMessage` and `binaryStringToMessage` functions. Remember to use good programming techniques, include the names of the programmers involved, and document your program.
|
311
|
311
|
|
312
|
312
|
---
|
313
|
313
|
|