Hiding Information into OOXML Documents: New Steganographic Perspectives

The simplest container of digital information is “the file” and among the vast array of files currently available, MS-Office files are probably the most widely used. The “Microsoft Compound Document File Format” (MCDFF) has often been used to host secret information. The new format created by Microsoft, first used with MS-Office 2007, makes use of a new standard, the ”Office Open XML Formats” (OOXML). The benefits include that the new format introduces the OOXML format, which lowers the risk of information leakage, as well as the use of MS-Office files as containers for steganography. In this work the authors, starting from the classification of information hiding adapted from Bauer, analyze four new methods for embedding data into the OOXML file format. These methods can be extremely useful when using MS-Office documents for steganographic purposes. The authors, analyzing a scenario composed of about 50.000 MS-Office files, highlight how the proposed methods are really helpful in real applications. An evaluation of the limits of the proposed methods is carried out by comparing them against the tool introduced by Microsoft to sanitize MS-Office files. The methods presented can be combined in order to extend the amount of data to be hidden in a single cover file.

[1]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[2]  Peter Deutsch,et al.  DEFLATE Compressed Data Format Specification version 1.3 , 1996, RFC.

[3]  Friedrich L. Bauer Decrypted secrets - methods and maxims of cryptology , 1997 .

[4]  Iuon-Chang Lin,et al.  A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Jungheum Park,et al.  Data concealment and detection in Microsoft Office 2007 files , 2009, Digit. Investig..

[6]  Claudio Soriente,et al.  Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..

[7]  Ling-Hwei Chen,et al.  A new steganography method via various animation timing effects in PowerPoint files , 2009, 2009 International Conference on Machine Learning and Cybernetics.

[8]  Martin Campbell-Kelly An introduction to macros , 1973 .

[9]  Shinsaku Kiyomoto,et al.  Model for a Common Notion of Privacy Leakage on Public Database , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[10]  Francesco Palmieri,et al.  New Steganographic Techniques for the OOXML File Format , 2011, ARES.

[11]  Anne Marie Courtney Introduction to Macros , 2010 .

[12]  Simson L. Garfinkel,et al.  New XML-Based Files Implications for Forensics , 2009, IEEE Security & Privacy.

[13]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[14]  Huang Liu-sheng,et al.  A new steganography method via combination in PowerPoint files , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).