skip to main content
10.1145/3279996.3280006acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdatasConference Proceedingsconference-collections
research-article

Text steganography in font color of MS excel sheet

Published: 01 October 2018 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2018 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

One of the ways to maintain the security of data transfer over the network is to encrypt the data before sending it, for the purpose of increasing data privacy and its importance. Steganography, is used to hide encrypted data in various documents, the art of concealment is embedded Secret Messages (SM) to be passed confidentially within a file without influence on the properties of the file and this can't be anyone's hand is to know that there is confidential data encapsulated by transport data.
Previous research used the Excel file to hide data in different ways, but the data masking and packaging by changing the color content writing is what distinguishes our research and make it alone in this area.
The Microsoft Excel file size is being used to hide data remains constant in spite of the file containing the confidential data. The secret for the survival of file size unchanged despite the addition of encrypted data, is that confidential data is embedding in the value of the color pallet of the font format used in the cells, leading to the font color change slightly.
The main advantage for scathing the Code Message (CM) upon the Cover Excel File (CEF) is making the brute force more confusing and has no possible to visualize the hiding message in normal circumstance, it is somehow rather than embedding it into either MS Word or PPT while the latter done sequentially, in this approach: each Full cell can hide a character with coding process (from 4 bits to 8 bits)
In this study, we have had advantages through applying a new approach of Text to Excel hiding techniques, likewise both the conductivity ratio, and the degree of disappearances are indicated perfectly.

References

[1]
Bhayaetal, W. 2013. Text Steganography Based on Font Type in MS-Word Documents. Journal of Computer Science 9 (7). PP. 898--904.
[2]
Por, L.Y and K.S. 2012. Wong and Chee, K. O. "A Text-Based Data Hiding Method Using Unicode Space Characters. J. Syst. Soft., 85: PP. 1075--1082.
[3]
Khandekar, S.A. and Dixit, M.R. 2012. Steganography for Text Messages Using Image. J. Elect. Commun. Eng., 2:PP. 01--04.
[4]
Saber, A. S. and Awadh, W. A. 2013. Steganography in MS Excel Document Using Unicode System Characteristic. J. Basrah Res. Sci., 39: PP.10--1 9.
[5]
Shahreza, M. H. S. and Shahreza, S. M. 2010. Arabic-Persian text steganography utilizing similar letters with different codes. Arabian J. Sci. Eng., 35: PP.213--222.
[6]
Por, L.Y. and Delina, B. 2008. Information Hiding: A New Approach in Text Steganography. Proceedings of the 7th WSEAS International Conference on Applied Computer and Applied Computational Science, Apr. 6--8, Hangzhou, China, PP. 1--7.
[7]
Khairullah, Md. 2009. A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents. IEEE Computer Society Washington, DC, USA ©2009. ICCEE '09 Proceedings of the 2009. Second International Conference on Computer and Electrical Engineering-Volume 01.
[8]
Al-Asadi, S and Bhaya, W.S. 2016. Text Stenography in Excel Documents Using Color and Type of Fonts. Research Journal of Applied Sciences 11(10):PP.1054--1059.
[9]
Yang, B. Sun, X. Xiang, L. Ruan Z. and Wu, R. 2011. Steganography in Ms Excel Document using Text-rotation Technique. Information Technology Journal, 10: 889--893.
[10]
Gutub, A. A. and Fattani, M. 2007. A novel Arabic Text Steganography Method Using Letter Points and Extensions. Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering, Vienna, Austria, PP. 28--31.
[11]
Provos, N. and Honeyman, P. 2003. Hide and Seek: An Introduction to Steganography. IEEE Secure. Privacy, 1:PP. 32--44.
[12]
Chen, B. and Wornell, G.W. 2001. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Inform. Theory, 47: PP. 1423--1443.
[13]
Aljawarneh, S. A. and Vangipuram, R. 2018. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. The Journal of Supercomputing, 1--38.
[14]
Aljawarneh, S. A., Vangipuram, R., Puligadda, V. K., and Vinjamuri, J. 2017. G-SPAMTNE: An approach to discover temporal association patterns and trends in internet of things. Future Generation Computer Systems, 74, 430--443.
[15]
Radhakrishna, V., Aljawarneh, S. A., Kumar, P. V., and Janaki, V. 2018. A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. Future Generation Computer Systems, 83, 582--595.
[16]
Aljawarneh, Shadi A., Raja A. Moftah, and Abdelsalam M. Maatuk. "Investigations of automatic methods for detecting the polymorphic worms signatures." Future Generation Computer Systems 60 (2016): 67--77.
[17]
Muneer Bani Yassein, Shadi A. Aljawarneh, and Esraa Masadeh. 2017. A new elastic trickle timer algorithm for Internet of Things. J. Netw. Comput. Appl. 89, C (July 2017), 38--47.
[18]
Shadi A. Aljawarneh, Mohammed R. Elkobaisi, and Abdelsalam M. Maatuk. 2017. A new agent approach for recognizing

Cited By

View all
  • (2021)A Comparative Analysis of Arabic Text SteganographyApplied Sciences10.3390/app1115685111:15(6851)Online publication date: 26-Jul-2021
  • (2020)A New Way to Store Simple Text FilesAlgorithms10.3390/a1304010113:4(101)Online publication date: 22-Apr-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
DATA '18: Proceedings of the First International Conference on Data Science, E-learning and Information Systems
October 2018
274 pages
ISBN:9781450365369
DOI:10.1145/3279996
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. code stream
  2. excel documents
  3. font cell color
  4. secret message
  5. steganography

Qualifiers

  • Research-article

Conference

DATA '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)2
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)A Comparative Analysis of Arabic Text SteganographyApplied Sciences10.3390/app1115685111:15(6851)Online publication date: 26-Jul-2021
  • (2020)A New Way to Store Simple Text FilesAlgorithms10.3390/a1304010113:4(101)Online publication date: 22-Apr-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media