Skip to main content

2018 | OriginalPaper | Buchkapitel

A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents

verfasst von : Niandong Liao, Caixia Sun, Lingyun Xiang, Feng Li

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The content of the document tends to be tampered and forged easily, and it may cause serious consequences in many important situations. Therefore, this paper proposes a multiple watermarking scheme for copyright protection and tamper detection of OOXML format documents. For an OOXML format document, we firstly embed a robust watermark by synonym substitutions, then embed double watermarks fragilely by utilizing the format characteristics of the document. The double fragile watermarks are embedded by the ways of modifying the word number in a text element defined by the main document body and modifying the values of revision identifiers. The embedding of multiple watermarks does not cause any visual impact on the content and format of the original document, which maintains the original meaning of the content basically. As shown by the experimental results, the watermarking method based on synonym substitutions has a strong robustness against the attacks on formats and the content. However, the double fragile watermarking methods can sensitively perceive tampers in the content and formats of the watermarked document, and predict the type of tampers with capability of locating the tampering.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chang, C.Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method. Comput. Linguist. 40(2), 403–448 (2014)CrossRef Chang, C.Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method. Comput. Linguist. 40(2), 403–448 (2014)CrossRef
2.
Zurück zum Zitat Cheng, W., Feng, H., Yang, C.: A robust text digital watermarking algorithm based on fragments regrouping strategy. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 600–603. IEEE (2010) Cheng, W., Feng, H., Yang, C.: A robust text digital watermarking algorithm based on fragments regrouping strategy. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 600–603. IEEE (2010)
3.
Zurück zum Zitat Duan, G.D., Zhao, X., Li, J.P., Liao, J.M.: A novel semi-fragile digital watermarking algorithm for image content authentication, localization and recovery. Dianzi Xuebao (Acta Electronica Sinica) 38(4), 842–847 (2010) Duan, G.D., Zhao, X., Li, J.P., Liao, J.M.: A novel semi-fragile digital watermarking algorithm for image content authentication, localization and recovery. Dianzi Xuebao (Acta Electronica Sinica) 38(4), 842–847 (2010)
4.
Zurück zum Zitat ECMA International: Office open xml file formats-open packaging conventions. Dianzi Xuebao (Acta Electronica Sinica) 38(4), 842–847 (2010) ECMA International: Office open xml file formats-open packaging conventions. Dianzi Xuebao (Acta Electronica Sinica) 38(4), 842–847 (2010)
5.
Zurück zum Zitat Fu, Z., Sun, X., Liu, Y., Li, B.: Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Netw. 5(9), 957–968 (2012)CrossRef Fu, Z., Sun, X., Liu, Y., Li, B.: Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Netw. 5(9), 957–968 (2012)CrossRef
6.
Zurück zum Zitat He, Y.H.: Word spacing and character encoding based on a combination of text features digital watermarking algorithm. In: Applied Mechanics and Materials, vol. 401, pp. 2029–2032. Trans Tech Publ. (2013) He, Y.H.: Word spacing and character encoding based on a combination of text features digital watermarking algorithm. In: Applied Mechanics and Materials, vol. 401, pp. 2029–2032. Trans Tech Publ. (2013)
7.
Zurück zum Zitat Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.: Twenty years of digital audio watermarking a comprehensive review. Signal Process. 128, 222–242 (2016) Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.: Twenty years of digital audio watermarking a comprehensive review. Signal Process. 128, 222–242 (2016)
8.
Zurück zum Zitat Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 145–150. IEEE (2017) Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 145–150. IEEE (2017)
9.
Zurück zum Zitat Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)CrossRef Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167–1180 (1999)CrossRef
10.
Zurück zum Zitat Li, C., Huang, J.W.: A semi-fragile image watermarking resisting to jpeg. J. Softw. 17(2), 315–324 (2006)CrossRef Li, C., Huang, J.W.: A semi-fragile image watermarking resisting to jpeg. J. Softw. 17(2), 315–324 (2006)CrossRef
11.
Zurück zum Zitat Low, S.H., Maxemchuk, N.F., Brassil, J., O’Gorman, L.: Document marking and identification using both line and word shifting. In: INFOCOM 1995, Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Bringing Information to People, Proceedings, vol. 2, pp. 853–860. IEEE (1995) Low, S.H., Maxemchuk, N.F., Brassil, J., O’Gorman, L.: Document marking and identification using both line and word shifting. In: INFOCOM 1995, Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Bringing Information to People, Proceedings, vol. 2, pp. 853–860. IEEE (1995)
12.
Zurück zum Zitat Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimed. Tools Appl. 71(3), 1893–1911 (2014)CrossRef Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimed. Tools Appl. 71(3), 1893–1911 (2014)CrossRef
13.
Zurück zum Zitat Xu, M., Wang, Y., Li, T.: A novel scheme of information hiding in word2007 document. J. Comput. Res. Dev. 46, 112–116 (2009) Xu, M., Wang, Y., Li, T.: A novel scheme of information hiding in word2007 document. J. Comput. Res. Dev. 46, 112–116 (2009)
Metadaten
Titel
A Multiple Watermarking Scheme for Content Authentication of OOXML Format Documents
verfasst von
Niandong Liao
Caixia Sun
Lingyun Xiang
Feng Li
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00015-8_13