Using pdf files as steganographic containers

Main Article Content

Y.V. Daus

Abstract

Nowadays, steganography uses almost all the variety of steganographic containers, from ordinary graphic files to video and audio content. The task of steganography is to hide the very fact of transmitting a notification or some information. On the other hand, you need to be sure that the information you have transmitted has not been distorted or replaced. Often, to protect the document from distortion on the way to the end user, the pdf file format is used ‒ portable document format. However, this file format, due to its rather simple and convenient structure, is quite easy to use as a steganographic container and add significant amounts of information without the knowledge of the sender of the file. But we can use these properties not only to transmit hidden information, but also to protect the information itself by transmitting the hash of the file itself along with the file itself.

Article Details

How to Cite
Daus, Y. (2026). Using pdf files as steganographic containers. Herald of the Odessa National Maritime University, (78), 226-240. https://doi.org/10.47049/2226-1893-2025-4-226-240
Section
Cybersecurity issues in organizing the educational process
Author Biography

Y.V. Daus, Odesa National Maritime University, Odesa, Ukraine

Ph.D., docent of the Department «Technical Cybernetics and Information Technologies named after prof. R.V. Merkt»

References

1. Kondratyuk, V. V., & Markova, I. S. (2017). Steganography in the modern information space. Bulletin of the National Technical University of Ukraine «Kyiv Polytechnic Institute». Series: Radio Engineering, Radio Equipment Manufacturing, 1(71), 37-43.
2. Kovalchuk, I. V., & Bondar, S. A. (2016). Steganographic methods of information protection in digital images. Youth and Market, 4(142), Р. 57-61.Chalaya L.E. User identification model based on keyboard handwriting. «Artificial Intelligence», No. 4. 2004, pp. 811-817.
3. Bryan, W. L., & Harter, N. (1897). Studies in the physiology and psychology of the telegraphic language. Psychological Review, 4(1), Р. 27-53. https://doi.org/10.1037/h0073806
4. Klemm R., Chen B. Hiding Sensitive Information Using PDF Steganography. arXiv preprint arXiv:2405.00865, 2024. https://arxiv.org/pdf/2405.00865 та https://arxiv.org/html/2405.00865
5. Ndoundam R., Ekodeck S.G.R. PDF Steganography based on Chinese Remainder Theorem. arXiv preprint arXiv:1506.01256, 2015. https://arxiv.org/pdf/1506.01256arXiv.
6. Koptyra P., Ogiela L. Distributed Steganography in PDF Files ‒ Secrets Hidden in Modified Pages. PMC (PubMed Central). 2021.: https://pmc.ncbi.nlm.nih.gov/articles/PMC7517136/PMC+2ResearchGate+2.
7. Vulnerability Exploitations Using Steganography in PDF Files. Interna-tional Journal of Computer Networks and Applications (IJCNA). https://www.ijcna.org/Manuscripts/IJCNA-2020-O-02.pdf ijcna.org.
8. A new method for pdf steganography in justified texts. ScienceDirect. https://www.sciencedirect.com/science/article/abs/pii/S221421261830485X ScienceDirect.
9. Maiorca D., Biggio B. Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. arXiv preprint arXiv:1707.05102, 2017. https://arxiv.org/pdf/1707.05102arXiv.
10. Steganography: An Overview. Geethanjali College of Engineering & Tech- nology. ResearchGate. ResearchGate.
11. A Comprehensive Review on Advancements and Applications of Stegano-graphy.ResearchGate. https://www.researchgate.net/publication/3790-21602_A_Comprehensive_Review_on_Advancements_and_Applications_of_Stegan_ography_ResearchGate
12. Steganography A Data Hiding Technique. St. Cloud State University Institutional Repository. https://repository.stcloudstate.edu/cgi/viewcontent.cgi?params=/context/msia_etds/article/1107/&path_info=auto_convert.PDFrepository.stcloudstate.edu