Skip to main content

Text Information Hiding Method Using the Custom Components

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Abstract

Open Office Xml (OOX) is the Microsoft Office document format type, which has been widely used in the world. It is of great significance to research the OOX document information hiding technology. In this paper, a text information hiding algorithm was proposed. The proposed method used OOX document custom components to hide secret information. Because the custom component was not referenced by the main document, the content and format of the main document have not been modified. In addition, since the information hiding process does not cause any change in the content and semantics of the displayed text in the document, it can resist content-based attacks, semantics-based attacks, and format-based attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fridrich, J.: Steganography in Digital Media – Principle, Algorithms, and Application. National Defense Industry Press, Beijing (2014)

    Google Scholar 

  2. Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735–745 (2008)

    Google Scholar 

  3. Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., Shi, Y.: Fingerprint liveness detection using gradient-based texture features. Sig. Image Video Process. 11(2), 381–388 (2017)

    Article  Google Scholar 

  4. Huang, L., Tseng, L., Hwang, M.: The study on data hiding in medical images. Int. J. Netw. Secur. 14(6), 301–309 (2012)

    Google Scholar 

  5. Wang, S., Xiao, C., Lin, Y.: A high bitrate information hiding algorithm for video in video. J. Comput. Electr. Autom. Control Inf. Eng. 3(11), 2572–2577 (2009)

    Google Scholar 

  6. Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)

    Article  Google Scholar 

  7. Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C., Sun, X.: Effective and efficient global context verification for image copy etection. IEEE Trans. Inf. Forensics Secur. (2016). https://doi.org/10.1109/TIFS.2016.2601065

    Article  Google Scholar 

  8. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  9. Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48671-0_14

    Chapter  Google Scholar 

  10. Low, S.H., Maxemchuk, N.F., Brassil, J.T.: Document marking and identification using both line and word shifting. In: Proceedings of INFOCOM 1995, vol. 2007, pp. 853–860. IEEE (1995)

    Google Scholar 

  11. Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)

    Article  Google Scholar 

  12. Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87, 1181–1196 (1999)

    Article  Google Scholar 

  13. Fu, Z.J.: The research of OOX security protect technology (Doctor Thesis). Hunan University, Changsha, Hunan, China (2012)

    Google Scholar 

  14. Microsoft Compound Document File Format. http://www.openoffice.org/sc/compdocfileformat.pdf

  15. OfficeOpenXMLFormats. http://www.microsoft.com/china/msdn/library/office/office/OfficeOpenXMLFormats.mspx?mfr=true

  16. Castiglione, A., De Santis, A., Soriente, C.: Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J. Syst. Softw. 80(5), 750–764 (2007)

    Google Scholar 

  17. Liu, T., Tsai, W.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)

    Google Scholar 

  18. XML File Parsing-the Limit of Length of Tag Content. https://my.oschina.net/devjing/blog/335521

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (61304208), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Open Fund of China-USA Computer Science Research Center (KJR16239), Hunan Province Science And Technology Plan Project Fund (2012GK3120), Scientific Research Fund of Hunan Province Education Department (13CY003, 14B106), Changsha City Science and Technology Plan Program (K1501013-11), Hunan Normal University University-Industry Cooperation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianjun Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, J., Xie, Y., Shen, J., Wang, L., Lin, H. (2018). Text Information Hiding Method Using the Custom Components. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics