A characteristic-preserving steganographic method based on revision identifiers

被引:0
|
作者
Xiang L. [1 ,2 ]
Sun C. [1 ,2 ]
Liao N. [1 ,2 ]
Wang W. [1 ,2 ]
机构
[1] Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha University of Science and Technology, Changsha, 410114, Hunan Province
[2] School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, 410114, Hunan Province
来源
| 1600年 / Science and Engineering Research Support Society卷 / 11期
基金
中国国家自然科学基金;
关键词
Anti-detection; Characteristic-preserving; OOXML; Revision identifier; Steganography;
D O I
10.14257/ijmue.2016.11.9.04
中图分类号
学科分类号
摘要
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographic method with high security is proposed in this paper. The proposed method embeds secret information by replacing the last three bytes of the values of the revision identifiers in the main document body of the OOXML format document, while preserving the normal characteristics of the document. Meanwhile, position marks are added to track the locations of the embedded information. In order to keep the internal data consistency of the document, the newly created values are added into other related parts. Experimental results show that the method not only possesses good imperceptibility and anti-detection capability, but also has high security and large embedding capacity. © 2016 SERSC.
引用
收藏
页码:29 / 38
页数:9
相关论文
共 50 条
  • [1] Towards Detailed Characteristic-Preserving Virtual Try-On
    Lee, Sangho
    Lee, Seoyoung
    Lee, Joonseok
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, : 2235 - 2239
  • [2] Toward Characteristic-Preserving Image-Based Virtual Try-On Network
    Wang, Bochao
    Zheng, Huabin
    Liang, Xiaodan
    Chen, Yimin
    Lin, Liang
    Yang, Meng
    COMPUTER VISION - ECCV 2018, PT XIII, 2018, 11217 : 607 - 623
  • [3] Fuzzy stage characteristic-preserving product life cycle modeling
    Chang, PT
    FUZZY SETS AND SYSTEMS, 2002, 126 (01) : 33 - 47
  • [4] A word-frequency-preserving steganographic method based on synonym substitution
    Xiang, Lingyun
    Yang, Xiao
    Zhang, Jiahe
    Wang, Weizheng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (01) : 132 - 139
  • [5] Characteristic-Preserving Latent Space for Unpaired Cross-Domain Translation of 3D Point Clouds
    Zheng, Jia-Wen
    Hsu, Jhen-Yung
    Li, Chih-Chia
    Lin, I-Chen
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2024, 30 (08) : 5212 - 5226
  • [6] A Steganographic Method Based on Roberts Operator
    Albdour, Nashat
    Zanoon, Nabeel
    JORDAN JOURNAL OF ELECTRICAL ENGINEERING, 2020, 6 (03): : 265 - 273
  • [7] A perfect maze based steganographic method
    Lee, Hui-Lung
    Lee, Chia-Feng
    Chen, Ling-Hwei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (12) : 2528 - 2535
  • [8] A steganographic method based on tetris games
    Ou, Zhan-He
    Chen, Ling-Hwei
    INFORMATION SCIENCES, 2014, 276 : 343 - 353
  • [9] A steganographic method based on a file attribute
    Hirohisa, Hioki
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 441 - 444
  • [10] Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model
    Dong, Yi
    Jiang, Xinghao
    Sun, Tanfeng
    Xu, Dawen
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 149 - 162