A new approach to covert communication via PDF files
Signal Processing
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
New steganographic techniques for the OOXML file format
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
IH'11 Proceedings of the 13th international conference on Information hiding
Information Sciences: an International Journal
UniSpaCh: A text-based data hiding method using Unicode space characters
Journal of Systems and Software
Forensic investigation of OOXML format documents
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A novel methodology for data hiding in Microsoft Word file
International Journal of Internet Technology and Secured Transactions
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
Journal of Systems and Software
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique is proposed. The data embedding is disguised such that the stegodocument appears to be the product of a collaborative writing effort. Text segments in the document are degenerated, mimicking to be the work of an author with inferior writing skills, with the secret message embedded in the choices of degenerations. The degenerations are then revised with the changes being tracked, making it appear as if a cautious author is correcting the mistakes. The change tracking information contained in the stegodocument allows the original cover, the degenerated document, and, hence, the secret message to be recovered. The extra change tracking information added during message embedding is vital in a normal collaboration scenario, and so hinders ignorant removals by skeptics. Experiments demonstrate the feasibility of the proposed method