2015 International Conference on Computing Communication Control and Automation 2015
DOI: 10.1109/iccubea.2015.62
|View full text |Cite
|
Sign up to set email alerts
|

Secured Approach for Hiding Data in MS Word Document Using MCDFF

Abstract: In the present electronic era to preserve the user data securely is a keen challenge. Nowadays, steganography is a rising orbit being utilized for guaranteed secure data transmission over the different mediums. Steganography is a technique which masks a message to hide its existence and make it appear "imperceptible by the eyes". It has been very clear that most of the text based steganography methods have the major drawback of low embedding efficiency. In this paper, authors have proposed a novel system of in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…A s far as p ossible, 31 please keep the introd u ction com p rehensible to scientists ou tside your particular field of 32 research. R eferences shou ld be nu m bered in ord er of ap p earance and indicated by a nu-33 m eral or num erals in square brackets-e.g., [1] or [2,3], or [4][5][6]. See the end of the d ocu -34 m en t for fu rth er d etails on references.…”
Section: Data Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…A s far as p ossible, 31 please keep the introd u ction com p rehensible to scientists ou tside your particular field of 32 research. R eferences shou ld be nu m bered in ord er of ap p earance and indicated by a nu-33 m eral or num erals in square brackets-e.g., [1] or [2,3], or [4][5][6]. See the end of the d ocu -34 m en t for fu rth er d etails on references.…”
Section: Data Processingmentioning
confidence: 99%
“…Two aspects of digital manuscript files created by word processing programs are of interest from a forensic science and digital archeology perspective: their intentional manipulation for the purposes of hiding information (steganography) [1][2][3][4][5][6][7] and their use to identify content generation and editing processes that may shed light on the origin of the information contained in the files. The latter is of importance for understanding the nature, sequence, and extent of textual modifications in, say, policy documents.…”
Section: Introductionmentioning
confidence: 99%
“…The data hiding is reversible in that the embedded information can be extracted to completely reconstruct the original Word document. Dasare and Dhore [3] leverage the Microsoft Compound Document File Format (MCDFF) to hide data in unused areas of a Word document while ensuring that the changes made to the document are not visible. Culnane et al [1] have enhanced the method of Zou and Shi [16] by applying multi-set modulation techniques to increase the data hiding capacities of binary document images; their approach employs automatic threshold computation, threshold buffering, shifted space distribution and letter space compensation techniques.…”
Section: Related Workmentioning
confidence: 99%