[1]郝宇,施勇,薛质. Office XML文档信息隐藏方法[J].计算机技术与发展,2017,27(10):96-100.
 HAO Yu,SHI Yong,XUE Zhi. Office XML Document Information Hiding Method[J].,2017,27(10):96-100.
点击复制

 Office XML文档信息隐藏方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年10期
页码:
96-100
栏目:
安全与防范
出版日期:
2017-10-10

文章信息/Info

Title:
 Office XML Document Information Hiding Method
文章编号:
1673-629X(2017)10-0096-05
作者:
 郝宇施勇薛质
 上海交通大学 电子信息与电气工程学院
Author(s):
 HAO YuSHI YongXUE Zhi
关键词:
 OfficeXML信息隐藏ExcelXMLWordXMLPowerPointXML
Keywords:
 Office Open XMLinformation hidingExcel XML Word XMLPowerPoint XML
分类号:
TP301
文献标志码:
A
摘要:
 
随着互联网和通信技术的飞速发展,计算机网络信息化等方面的发展对信息安全技术提出了越来越高的要求.电子文档已成为储存及传送信息的最常用载体,计算机泄密问题随之产生,且更具隐密性、潜伏性和危害性,同时也增加了失泄密问题预防难度.Office 2007文档采用了一种新的默认文件格式,即Office Open XML格式,为在Office文档中隐藏信息提供了新的思路.为此,结合Office文档的自身特点和XML格式规范,提出了一种符合Office XML格式规范的信息隐藏方法.该方法针对DOCX、PPTX和XLSX三种不同类型格式文档,匹配与格式相对应的特定属性,选取或构建包含该属性的XML段落,通过替换或构造特有的标识属性值将隐秘信息嵌入目标文本载体中,以实现信息隐藏的目的.实验结果表明,该方法使用文本容量大,安全性高,较好地解决了现有方法鲁棒性不足的问题.
Abstract:
 With the rapid development of Internet and communication technology,the computer network pays more and more attention in information,which also emphasizes the increasing importance of information security technology. Electronic documents have become the most commonly used carrier in information storage and transmission and thus the problem of computer file leakage has generated more hidden,latent and harmful properties than other classical methods,increasing the difficulty in prevention of leakage. Since a new default file format is introduced in Microsoft Office 2007 document,which is called Office Open XML format and provides a new ideas for infor-mation hiding in Excel documents. An information hiding method based on Office Open XML file format is proposed in investigation of features of Office documents and XML specifications. With different kinds of files,such as DOCX,PPTX and XLSX,it adopts different i-dentifier attribute,which finds or creates a segment with this attribute to hide information by changing the attribute value. Experiment re-sults show that it can hide large capacity information and thus is safety with high capacity and security,which has solved poor robustness of the existing methods.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(10):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(10):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(10):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(10):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(10):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(10):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(10):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(10):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(10):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(10):47.

更新日期/Last Update: 2017-11-23