Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2008.654.660LiuYuling SunXingming LiuYongping LiChang-Tsun 4200874Communications via Microsoft Power Point (PPT for short)
documents are commonplace, so it is crucial to take advantage of PPT documents
for information security and digital forensics. In this study, we propose
a new method of text steganography, called MIMIC-PPT, which combines text
mimicking technique with characteristics of PPT documents. Firstly, a
dictionary and some sentence templates are automatically created by parsing
the body text of a PPT document. Then, cryptographic information is converted
into innocuous sentences by using the dictionary and the sentence templates.
Finally, the sentences are written into the note pages of the PPT document.
With MIMIC-PPT, there is no need for the communication parties to share
the dictionary and sentence templates while the efficiency and security
are greatly improved.]]>Bergmair, R.,20072007Chapman, M.T. and G.I. Davida,19971997Chapman M.T. and G.I. Davida,19971997PP: 335345Chapman, M.T., G.I. Davida and M. Rennhard,20012200156165Chapman, M.T. and G.I. Davida,20022437276287Chiang, Y.L., L.P. Chang, W.T. Hsieh and W.C. Chen,20042939129140EI-Kwae, E.A. and L. Cheng,20024675132140Gmbh, S.,20002000Maher, K.,19951995Murphy, B. and C. Vogel,20072007Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn,19998710621078Topkara, M., C. Taskiran and E.J. Delp,20045681441452Topkara, M., G. Riccardi, D. Hakkani-Tur and M.J. Atallah,20062006pp: 720Toutanova, K., D. Klein, C.D. Manning and Y. Singer,20032003pp: 173180Walker, J.,19941994Wayner, P.,199216193214Wayner, P.,199519285299Wayner, P.,19971997Wayner, P.,19991999Wayner, P.,20022nd Edn.,pp: 81-128pp: 81-128Zhang, H.P., T. Liu, J.S. Ma and X.T. Liao,20052005