Using pdf files as steganographic containers
Main Article Content
Abstract
Nowadays, steganography uses almost all the variety of steganographic containers, from ordinary graphic files to video and audio content. The task of steganography is to hide the very fact of transmitting a notification or some information. On the other hand, you need to be sure that the information you have transmitted has not been distorted or replaced. Often, to protect the document from distortion on the way to the end user, the pdf file format is used ‒ portable document format. However, this file format, due to its rather simple and convenient structure, is quite easy to use as a steganographic container and add significant amounts of information without the knowledge of the sender of the file. But we can use these properties not only to transmit hidden information, but also to protect the information itself by transmitting the hash of the file itself along with the file itself.
Article Details
References
2. Kovalchuk, I. V., & Bondar, S. A. (2016). Steganographic methods of information protection in digital images. Youth and Market, 4(142), Р. 57-61.Chalaya L.E. User identification model based on keyboard handwriting. «Artificial Intelligence», No. 4. 2004, pp. 811-817.
3. Bryan, W. L., & Harter, N. (1897). Studies in the physiology and psychology of the telegraphic language. Psychological Review, 4(1), Р. 27-53. https://doi.org/10.1037/h0073806
4. Klemm R., Chen B. Hiding Sensitive Information Using PDF Steganography. arXiv preprint arXiv:2405.00865, 2024. https://arxiv.org/pdf/2405.00865 та https://arxiv.org/html/2405.00865
5. Ndoundam R., Ekodeck S.G.R. PDF Steganography based on Chinese Remainder Theorem. arXiv preprint arXiv:1506.01256, 2015. https://arxiv.org/pdf/1506.01256arXiv.
6. Koptyra P., Ogiela L. Distributed Steganography in PDF Files ‒ Secrets Hidden in Modified Pages. PMC (PubMed Central). 2021.: https://pmc.ncbi.nlm.nih.gov/articles/PMC7517136/PMC+2ResearchGate+2.
7. Vulnerability Exploitations Using Steganography in PDF Files. Interna-tional Journal of Computer Networks and Applications (IJCNA). https://www.ijcna.org/Manuscripts/IJCNA-2020-O-02.pdf ijcna.org.
8. A new method for pdf steganography in justified texts. ScienceDirect. https://www.sciencedirect.com/science/article/abs/pii/S221421261830485X ScienceDirect.
9. Maiorca D., Biggio B. Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. arXiv preprint arXiv:1707.05102, 2017. https://arxiv.org/pdf/1707.05102arXiv.
10. Steganography: An Overview. Geethanjali College of Engineering & Tech- nology. ResearchGate. ResearchGate.
11. A Comprehensive Review on Advancements and Applications of Stegano-graphy.ResearchGate. https://www.researchgate.net/publication/3790-21602_A_Comprehensive_Review_on_Advancements_and_Applications_of_Stegan_ography_ResearchGate
12. Steganography A Data Hiding Technique. St. Cloud State University Institutional Repository. https://repository.stcloudstate.edu/cgi/viewcontent.cgi?params=/context/msia_etds/article/1107/&path_info=auto_convert.PDFrepository.stcloudstate.edu