Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format
ICISS '08 Proceedings of the 2008 International Conference on Information Science and Security
Natural language watermarking via morphosyntactic alterations
Computer Speech and Language
DCT Domain Message Embedding in Spread-Spectrum Steganography System
DCC '09 Proceedings of the 2009 Data Compression Conference
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
Noun-Verb based technique of text watermarking using recursive decent semantic net parsers
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
IEEE Transactions on Information Forensics and Security
New XML-Based Files Implications for Forensics
IEEE Security and Privacy
Data concealment and detection in Microsoft Office 2007 files
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Interword distance changes represented by sine waves for watermarking text images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
A new steganographic method for data hiding in Microsoft Word 2007–2010 (Microsoft Corp., Redmond, WA, USA) files that use Office Open XML (OOXML) format is proposed. Secret information can be imperceptibly embedded into OOXML documents by splitting up the printable text, which is defined by the main document body of the OOXML format document. The number of printable words contained in each segment represents the secret message. Theoretical analysis demonstrates that embedding bit rate of the proposed method can take the maximum value (0.8) when 2 bits of secret message are embedded into each segment. Experiments show that 0.44 bit is embedded into each word and 1/151 bit is embedded into each bit of the document on average, which is higher than contemporary linguistic steganography approaches. The method can resist “Format”, “Impersonation”, “Save As”, “Copy”, and other active attacks, and all these changes will not be shown on the MS Office screen display. Therefore, the proposed method can apply to the fields of covert communication and security protection for OOXML format documents. Copyright © 2011 John Wiley & Sons, Ltd.