MIMIC-PPT: Mimicking-based Steganography for Microsoft Power- Point Document
نویسندگان
چکیده
Communications via Microsoft PowerPoint (PPT for short) documents are commonplace, so it is crucial to take advantage of PPT documents for information security and digital forensics. In this paper, we propose a new method of text steganography, called MIMIC-PPT, which combines text mimicking technique with characteristics of PPT documents. Firstly, a dictionary and some sentence templates are automatically created by parsing the body text of a PPT document. Then, cryptographic information is converted into innocuous sentences by using the dictionary and the sentence templates. Finally, the sentences are written into the note pages of the PPT document. With MIMIC-PPT, there is no need for the communication parties to share the dictionary and sentence templates while the efficiency and security are greatly improved.
منابع مشابه
A New Property Coding in Text Steganography of Microsoft Word Documents
Electronic documents, similarly as printed documents, need to be secured by adding some specific features that allow efficient copyright protection, authentication, document tracking or investigation of counterfeiting and forgeries. Microsoft Word is one of the most popular word processors, and several methods exist for embedding data specially in documents produced by it. We present a new type...
متن کاملImpact of utilisation of uncompleted handouts on power point presentations (PPT) in rural Indian medical institute
Introduction: Note taking while attending a PPT requires highactivity of memory and writing process which ultimately leadsto what is called “death by power point” referring to boredomand fatigue. To overcome this we planned to evaluate the impactof utilisation of uncompleted handouts given prior to PPTpresentations.Methods: Final year MBBS students were divided in 2 batches,batch A and batch B....
متن کاملNew Steganographic Techniques for the OOXML File Format
The simplest container of digital information is “the file” and among the vast array of files currently available, MS-Office files are the most widely used. The “Microsoft Compound Document File Format” (MCDFF) has often been used to host secret information. The new format created by Microsoft, first used with MS-Office 2007, makes use of a new standard, the “Office Open XML Formats” (OOXML). T...
متن کاملViral Reverse Transcriptases Show Selective High Affinity Binding to DNA-DNA Primer-Templates that Resemble the Polypurine Tract
Previous results using a SELEX (Systematic Evolution of Ligands by Exponential Enrichment)-based approach that selected DNA primer-template duplexes binding with high affinity to HIV reverse transcriptase (RT) showed that primers mimicking the 3' end, and in particular the six nt terminal G tract, of the RNA polypurine tract (PPT; HIV PPT: 5'-AAAAGAAAAGGGGGG-3') were preferentially selected. In...
متن کاملDigital image steganography: Survey and analysis of current methods
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science...
متن کامل