Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for hiding information based on word2007 text segmentation

A word2007, information hiding technology, applied in the field of information hiding based on word2007 text segmentation, can solve the problems of seizure, increase of file suspiciousness, increase in size, etc.

Inactive Publication Date: 2011-06-15
NANJING UNIV OF INFORMATION SCI & TECH
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The robustness is not good enough. If the capacity of hidden secret information is slightly larger, it is easy to be seized and attacked by statistical analysis software
[0007] 2. If the capacity of the embedded secret information increases significantly, the size of the entire file will also increase significantly, which increases the suspiciousness of the file to a certain extent, that is, the concealment is not good enough
[0008] 3. More importantly, this type of method is aimed at electronic documents in compound document format, and cannot be applied to electronic document types in the new Open Office XML format, such as Office 2007, Office 2008, etc.
[0012] 1. Poor robustness, unable to resist attacks such as save as, delete, edit, etc.
[0013] 2. Theoretically, the hidden capacity is unlimited, but in practice, if the amount of information hidden by annotations is slightly larger, it is easy to cause suspicion (the suspicion of human eyes and the suspicion of analysis software)
[0014] 3. In terms of concealment, although this method does not affect any displayed content of word documents, it is easy to be seized by some information detection tools
[0015] The latter method is more robust and can resist attacks such as saving as, deleting, editing, etc., but its limitations are:
[0017] 2. The hidden capacity of its secret information is theoretically unlimited, but in practice, if the size of the unknown component containing the secret information exceeds a certain ratio of the original electronic document carrier, it is easy to cause suspicion, because an electronic The capacity of a document is closely related to its display content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for hiding information based on word2007 text segmentation
  • Method and device for hiding information based on word2007 text segmentation
  • Method and device for hiding information based on word2007 text segmentation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose and technical solution of the present invention clearer, the information embedding and extraction process proposed by the embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] The original covert carrier document is a word electronic document in Open Office XML format, and its ZIP package document structure is as attached figure 1 shown. The secret information to be hidden is encoded and converted into 8-bit binary data: 00101101. The correspondence between the secret information to be hidden and the number of words required is as follows figure 2 shown. Then the steps to hide the secret information in the word2007 electronic document are:

[0049] The first step is to read the main component document.xml file in the hidden carrier word2007 document package, and extract the root node (document), container (body), paragraph (paragraph), text and its attribute set (run...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for hiding information based on word2007 text segmentation. An Office Open extensible markup language (XML) file format is a new file format which is adopted by Microsoft office 2007 and later versions thereof. In the method for hiding secret information, the secret information is converted into a numerical value so as to be embedded into run number of each paragraph according to the coding requirement of the secret information to be transmitted based on the paragraph serving as a unit by segmenting the number of run elements in each paragraph. Meanwhile, the robustness of the hiding method is improved by adding robust marks into the segmented run elements. The extraction process of the secret information is a reverse embedding process. In the method, any displayed content of an electronic document is not changed; the method has extremely strong concealment; the robustness of hidden information is enhanced by adding the robust marks; and the method can be applied to hidden transmission of confidential information such as national defense, politics, commerce and the like.

Description

technical field [0001] The invention relates to the field of information security using electronic documents as carriers for covert communication, in particular to an information hiding method and device based on word2007 text segmentation. technical background [0002] With the rapid development of computer technology and network technology, the importance of information security has become increasingly prominent. Information hiding technology is an important branch in the field of information security, which can provide technical support for the secret, safe and reliable transmission of confidential information such as national defense, military affairs, and commerce. Text documents are the most widely used and frequently used carrier types on the Internet, so the covert transmission of secret information using text documents as covert carriers is less likely to arouse the suspicion of attackers. Office documents are the most widely used text document types on the Interne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/24G06F17/22G06F21/62
Inventor 付章杰孙星明刘玉玲
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products