Abstract
Content authentication of the text document has become a major concern in the current digital era. In this paper, a tamper locating algorithm for DOCX document content authentication is proposed. Firstly, according to the characteristics of DOCX format, the authentication information unrelated to the text content is embedded into the main setting file named document.xml by displaying characters segmentation. Then, identify the integrity of the text by confirming whether the embedded watermark is same to the authentication watermark. Experiments show that the algorithm is very fragile to any modification and can locate the tampered places very well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Frank, R.: Introducing the office (2007) open xml file formats. http://msdn2.microsoft.com/en-us/library/aa338205.aspx. Accessed 28 April 2018
Xiao, H.Q., Liu, G.S., Yin, M.L.: A new text content authentication technique based on CRC. J. Harbin Univ. Commer. (Natural Sciences Edition) (Chinese), 22(4), 84–87 (2006)
Fang, W.Sh., Shu, M.L.: Fragile text watermarking based on changing the characters’ underlining. Comput. Appl. Softw. (Chinese) 25(11), 271–273 (2008)
Zou, X.G., Sun, Sh.H.: Fragile watermark algorithm in RTF format text. Comput. Eng. (Chinese) 33(4), 131–133 (2007)
Yang, H.J., Kot, A.C.: Data hiding for binary images authentication by considering a larger neighborhood. In: Proceedings of IEEE International Conference on Circuits and Systems, pp. 1269–1272, New Orleans (2007)
Li, Zh.H., Hou, J.J., Song, W.: Binary document image authentication watermarking technique based on hierarchical structure. Acta Automatica Sinica (Chinese) 34(8), 841–848 (2008)
Zunera, J., Anwar, M., Jabeen, H.: Word length based zero-watermarking algorithm for tamper detection in text documents. In: Proceedings of International Conference on Computer Engineering and Technology, pp. 378–382, Chengdu (2010)
Zunera, J., Anwar, M., Maria, S.: Content based zero-watermarking algorithm for authentication of text documents. Int. J. Comput. Sci. Inf. Secur. 7(2), 212–217 (2010)
Kaur, S., Babbarr, G.: A zero-watermarking algorithm on multiple occurrences of letters for text tampering detection. Int. J. Comput. Sci. Eng. 5(5), 294–301 (2013)
Zhao, L., Cui, D.W.: Text watermark algorithm based on tone of Chinese characters. Comput. Eng. 35(10), 142–144 (2009)
Zhou, X.M., Wang, S.C., Zhao, W.D., et al.: A semi-fragile watermarking scheme for content authentication of Chinese text documents. In: Proceedings of 2nd IEEE International Conference on Computer Science and Information Technology, pp. 439–443, Beijing (2009)
Liang, H.Y., Cao, Y.: Text watermark algorithm based on color and font. Jo. South China Normal Univ. (Natural Science Edition), 87–90 (2011)
Fu, Z.J., Sun, X.M., Liu, Y.L.: Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Netw. 5(9), 957–968 (2012)
Acknowledgement
This paper is partially supported by Hunan Natural Science Foundation (2018JJ2301), the National Key Research and Development Program of China (2017YFC1703306), Doctoral Research Start-up Fund of Hunan University of Chinese Medicine (Human vision mechanism and its application in image fusion).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Xin, G., Qi, X., Ding, C. (2018). An Improved Tamper Detection and Location Scheme for DOCX Format Documents. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-00015-8_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00014-1
Online ISBN: 978-3-030-00015-8
eBook Packages: Computer ScienceComputer Science (R0)