Abstract
PDF is a widely used document format. By studying the structure of PDF file, we notice that incremental updates method used by PDF file can be used to embed information for covert communication. So in this paper, we present three novel data hiding algorithms based on incremental updates which can provide large enough embedding capacity without any change of file display. These algorithms embed information by different covert channels and the logistic chaotic map is used to enhance the security of the embedded data. The experimental results show that the algorithms are also robust to PDF files annotating, marking and interactive forms editing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adobe Systems Incorporated. PDF Reference, 5th edn., version 1.6 (2006), http://www.adobe.com/devnet/pdf/pdfs/PDFReference16.pdf
Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE Journal on Selected Areas in Communications 16(4), 561–572 (1998)
Brassil, J.T., et al.: Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications 13(8), 1495–1504 (1995)
Zhong, S., Chen, T.: Information Steganography Algorithm Based on PDF Documents. Computer Engineering 32(3), 161–163 (2006)
Low, S.H., et al.: Document marking an identification using both line and word shifing. In: Proceedings INFOCOM 1995, Boston, MA, pp. 853–860 (April 1995)
Maxemchuk, N.F., Low, S.H.: Marking text documents. In: Proceedings, International Conference Image Processing, Boston, Santa Barbara, CA, October 1997, pp. 13–17 (1997)
Franz, E., Pfitzmann, A.: Steganography Secure against Cover-Stego-Attack. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 29–46. Springer, Heidelberg (2000)
wbStego Studio. The steganography tool wbStego4 (2007), http://www.wbailer.com/wbstego
Liu, Y., Sun, X., Luo, G.: A Novel Information Hiding Algorithm Based on Structure of PDF Document. Computer Engineering 32(17), 230–232 (2006)
Liu, X., Zhang, Q., Tang, C., Zhao, J., Liu, J.: A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation. In: 2008 International Symposiums on Information Processing (ISIP), May 23-25, pp. 417–421 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, H., Li, L., Li, J., Huang, J. (2012). Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)