Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates | SpringerLink
Skip to main content

Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates

  • Conference paper
Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

  • 2558 Accesses

Abstract

PDF is a widely used document format. By studying the structure of PDF file, we notice that incremental updates method used by PDF file can be used to embed information for covert communication. So in this paper, we present three novel data hiding algorithms based on incremental updates which can provide large enough embedding capacity without any change of file display. These algorithms embed information by different covert channels and the logistic chaotic map is used to enhance the security of the embedded data. The experimental results show that the algorithms are also robust to PDF files annotating, marking and interactive forms editing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adobe Systems Incorporated. PDF Reference, 5th edn., version 1.6 (2006), http://www.adobe.com/devnet/pdf/pdfs/PDFReference16.pdf

  2. Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE Journal on Selected Areas in Communications 16(4), 561–572 (1998)

    Article  Google Scholar 

  3. Brassil, J.T., et al.: Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications 13(8), 1495–1504 (1995)

    Article  Google Scholar 

  4. Zhong, S., Chen, T.: Information Steganography Algorithm Based on PDF Documents. Computer Engineering 32(3), 161–163 (2006)

    MathSciNet  Google Scholar 

  5. Low, S.H., et al.: Document marking an identification using both line and word shifing. In: Proceedings INFOCOM 1995, Boston, MA, pp. 853–860 (April 1995)

    Google Scholar 

  6. Maxemchuk, N.F., Low, S.H.: Marking text documents. In: Proceedings, International Conference Image Processing, Boston, Santa Barbara, CA, October 1997, pp. 13–17 (1997)

    Google Scholar 

  7. Franz, E., Pfitzmann, A.: Steganography Secure against Cover-Stego-Attack. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 29–46. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. wbStego Studio. The steganography tool wbStego4 (2007), http://www.wbailer.com/wbstego

  9. Liu, Y., Sun, X., Luo, G.: A Novel Information Hiding Algorithm Based on Structure of PDF Document. Computer Engineering 32(17), 230–232 (2006)

    Google Scholar 

  10. Liu, X., Zhang, Q., Tang, C., Zhao, J., Liu, J.: A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation. In: 2008 International Symposiums on Information Processing (ISIP), May 23-25, pp. 417–421 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, H., Li, L., Li, J., Huang, J. (2012). Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics