A characteristic-preserving steganographic method based on revision identifiers

被引:0
|
作者
Xiang L. [1 ,2 ]
Sun C. [1 ,2 ]
Liao N. [1 ,2 ]
Wang W. [1 ,2 ]
机构
[1] Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha University of Science and Technology, Changsha, 410114, Hunan Province
[2] School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, 410114, Hunan Province
来源
| 1600年 / Science and Engineering Research Support Society卷 / 11期
基金
中国国家自然科学基金;
关键词
Anti-detection; Characteristic-preserving; OOXML; Revision identifier; Steganography;
D O I
10.14257/ijmue.2016.11.9.04
中图分类号
学科分类号
摘要
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographic method with high security is proposed in this paper. The proposed method embeds secret information by replacing the last three bytes of the values of the revision identifiers in the main document body of the OOXML format document, while preserving the normal characteristics of the document. Meanwhile, position marks are added to track the locations of the embedded information. In order to keep the internal data consistency of the document, the newly created values are added into other related parts. Experimental results show that the method not only possesses good imperceptibility and anti-detection capability, but also has high security and large embedding capacity. © 2016 SERSC.
引用
收藏
页码:29 / 38
页数:9
相关论文
共 50 条
  • [31] Enhanced Steganographic Method Preserving Base Quality of Information Using LSB, Parity and Spread Spectrum Technique
    Kaur, Ramandeep
    Thakur, Abhishek
    Saini, Hardeep Singh
    Kumar, Rajesh
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 148 - 152
  • [32] A steganographic method based on gain quantization for iLBC speech streams
    Zhaopin Su
    Wangwang Li
    Guofu Zhang
    Donghui Hu
    Xianxian Zhou
    Multimedia Systems, 2020, 26 : 223 - 233
  • [33] Reversible steganographic method using SMVQ approach based on declustering
    Chin-Chen Chang
    Chih-Yang Lin
    INFORMATION SCIENCES, 2007, 177 (08) : 1796 - 1805
  • [34] A DCT-based Mod4 steganographic method
    Wong, KokSheik
    Qi, Xiaojun
    Tanaka, Kiyoshi
    SIGNAL PROCESSING, 2007, 87 (06) : 1251 - 1263
  • [35] Robust steganographic method based on unconventional approach of neural networks
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    APPLIED SOFT COMPUTING, 2018, 67 : 505 - 518
  • [36] A steganographic method based on self-organizing map and HVS
    Zhang, Jiajia
    Huang, Huixian
    Wang, Chenhao
    Pan, Hongbin
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 36 - 39
  • [37] Algorithmic method of security of the Internet of Things based on steganographic coding
    Kabulov, Anvar
    Saymanov, Islambek
    Yarashov, Inomjon
    Muxammadiev, Firdays
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 1 - 5
  • [38] Robust Steganographic Method based on Center Weighted Median Algorithm
    Carvajal-Gamez, Blanca E.
    Gallegos-Funes, Francisco J.
    Luis Lopez-Bonilla, Jose
    Ponomaryov, Volodymyr
    IMAGE PROCESSING: ALGORITHMS AND SYSTEMS VIII, 2010, 7532
  • [39] Steganographic method based on interpolation and LSB substitution of digital images
    Jung, Ki-Hyun
    Yoo, Kee-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (06) : 2143 - 2155
  • [40] Color local complexity estimation based steganographic (CLCES) method
    Carvajal-Gamez, Blanca E.
    Gallegos-Funes, Francisco J.
    Rosales-Silva, Alberto J.
    EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (04) : 1132 - 1142