1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen...

12
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10

Transcript of 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen...

Page 1: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

1

Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning

Speaker:Fanjia Yen

Adviser:Quincy Wu

Date:2008/04/10

Page 2: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

2

Outline

Steganography ISM (Inter-word space) Modulation of the Inter-word Space Embedding rule Hidden Data Extraction Reference

Page 3: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

3

Steganography

What to hide Text Images Sound

How to hide Embed text in text/image/sound files Embed image in text/image/sound files Embed sound in text/image/sound files

Page 4: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

4

ISM (Inter-word space)(1/2)

A space between adjacent words in a text row.

There are nine inter-word spaces in the row.

The actual length of the inter-word spaces in terms of number of pixels. 1 pixel -> 1 bit. For example,”1”for black and “0” for white.

Page 5: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

5

ISM (Inter-word space)(2/2)

Page 6: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

6

Modulation of the Inter-word Space(1/2)

Page 7: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

7

Modulation of the Inter-word Space(2/2) After data embedding:

Page 8: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

8

Embedding rule(1/2)

Page 9: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

9

Embedding rule(2/2)

Page 10: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

10

Hidden Data Extraction(1/2)

Page 11: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

11

Hidden Data Extraction(2/2)

If ΦA - ΦB >0, bit ‘1’ is extracted. If ΦA - ΦB <0, bit ‘0’ is extracted.

Page 12: 1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.

12

Reference

http://en.wikipedia.org/wiki/Steganography wikipedia

http://ms11.voip.edu.tw/~eddie/file/Formatted_Text_Document_Data_Hiding_Robust_to_Printing_Copying_and_Scanning.pdf