Int. J. of Internet Technology and Secured Transactions   »   2012 Vol.4, No.2/3

 

 

Title: A novel methodology for data hiding in Microsoft Word file

 

Authors: Rajesh Kumar Tiwari; G. Sahoo

 

Addresses:
Department of Computer Science and Engineering, R.V.S. College of Engineering and Technology, Jamshedpur, Jharkhand, Pin-831012, India.
Department of Information Technology, BIT Mesra, Ranchi, Jharkhand, India

 

Abstract: In the current business world, Word processors, Excel spread sheets and PowerPoint presentations have become extremely useful tools. Nowadays, electronic devises like iphone, pda, pmp, etc. are providing facilities like editing the Word documents, creating Excel sheets, or making power point presentations. Microsoft compound document uses opaque formats like Microsoft Compound Document File Format that may contain undisclosed data. So, these files may play a very vital role for secure communication. Very few researchers have developed methods for data hiding in the Microsoft Word document and that are also of low embedding characteristics. In this work, we have developed two techniques. The first technique searches insignificant areas without changing the format of the file and it conceals reasonable amount of encrypted secret data. The next technique is useful for storing voluminous encrypted secret data without disturbing any format, features or characteristics of the file. Due to these properties, both techniques undoubtedly will be helpful in the corporate sector, defence and national security system. The practical implementation of this has been done on Microsoft platform.

 

Keywords: steganography; document files; trash space; Microsoft Word files; data hiding; secure communications; data security; cryptography; encrypted secret data.

 

DOI: 10.1504/IJITST.2012.047960

 

Int. J. of Internet Technology and Secured Transactions, 2012 Vol.4, No.2/3, pp.162 - 177

 

Date of acceptance: 16 Mar 2012
Available online: 16 Jul 2012

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article