Abstract
Open Office Xml (OOX) is the Microsoft Office document format type, which has been widely used in the world. It is of great significance to research the OOX document information hiding technology. In this paper, a text information hiding algorithm was proposed. The proposed method used OOX document custom components to hide secret information. Because the custom component was not referenced by the main document, the content and format of the main document have not been modified. In addition, since the information hiding process does not cause any change in the content and semantics of the displayed text in the document, it can resist content-based attacks, semantics-based attacks, and format-based attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fridrich, J.: Steganography in Digital Media – Principle, Algorithms, and Application. National Defense Industry Press, Beijing (2014)
Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735–745 (2008)
Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., Shi, Y.: Fingerprint liveness detection using gradient-based texture features. Sig. Image Video Process. 11(2), 381–388 (2017)
Huang, L., Tseng, L., Hwang, M.: The study on data hiding in medical images. Int. J. Netw. Secur. 14(6), 301–309 (2012)
Wang, S., Xiao, C., Lin, Y.: A high bitrate information hiding algorithm for video in video. J. Comput. Electr. Autom. Control Inf. Eng. 3(11), 2572–2577 (2009)
Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)
Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C., Sun, X.: Effective and efficient global context verification for image copy etection. IEEE Trans. Inf. Forensics Secur. (2016). https://doi.org/10.1109/TIFS.2016.2601065
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48671-0_14
Low, S.H., Maxemchuk, N.F., Brassil, J.T.: Document marking and identification using both line and word shifting. In: Proceedings of INFOCOM 1995, vol. 2007, pp. 853–860. IEEE (1995)
Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)
Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87, 1181–1196 (1999)
Fu, Z.J.: The research of OOX security protect technology (Doctor Thesis). Hunan University, Changsha, Hunan, China (2012)
Microsoft Compound Document File Format. http://www.openoffice.org/sc/compdocfileformat.pdf
OfficeOpenXMLFormats. http://www.microsoft.com/china/msdn/library/office/office/OfficeOpenXMLFormats.mspx?mfr=true
Castiglione, A., De Santis, A., Soriente, C.: Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J. Syst. Softw. 80(5), 750–764 (2007)
Liu, T., Tsai, W.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)
XML File Parsing-the Limit of Length of Tag Content. https://my.oschina.net/devjing/blog/335521
Acknowledgments
This work is supported by National Natural Science Foundation of China (61304208), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Open Fund of China-USA Computer Science Research Center (KJR16239), Hunan Province Science And Technology Plan Project Fund (2012GK3120), Scientific Research Fund of Hunan Province Education Department (13CY003, 14B106), Changsha City Science and Technology Plan Program (K1501013-11), Hunan Normal University University-Industry Cooperation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, J., Xie, Y., Shen, J., Wang, L., Lin, H. (2018). Text Information Hiding Method Using the Custom Components. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-00015-8_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00014-1
Online ISBN: 978-3-030-00015-8
eBook Packages: Computer ScienceComputer Science (R0)