Advertisement

Demonstration Experiment of Data Hiding into OOXML Document for Suppression of Plagiarism

  • Akinori ItoEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

When a teacher gathers the students’ assignment electronically, one big problem is plagiarism of report from documents in a Web site or other learner’s report. This paper proposes a framework using data hiding technology to suppress plagiarism. In this framework, a teacher embeds ID of a student into a template file and sends the template file to the student. The student writes a report using the template file and submits it. The teacher extracts the ID from the report file to validate the file’s originality. The Open Office XML (OOXML) format was chosen as the format of the template file because of its popularity. In the experiment, two methods were examined. The first method inserts small images with the ID into the template file. The second method embeds the ID into the fonts of the heading. According to the results of the experiments, the method using images was fragile against format conversion into PDF, and the method of font switching was more robust while the amount of embedded information was small.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bhaya, W., Rahma, A.M., AL-Nasrawi, D.: Text steganography based on font type in MS-Word documents. J. of Computer Science 9(7), 898–904 (2013)Google Scholar
  2. 2.
    Boutell, T. et al.: PNG (Portable Network Graphics) specification version 1.0. RFC2083 (1997)Google Scholar
  3. 3.
    Castiglione, A., D’Allessio, B., Santis, A.D., Palmieri, F.: Hiding information into OOXML documents: New steganographic perspectives. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(4), 59–83 (2011)Google Scholar
  4. 4.
    Chen, M., Wong, E.K., Memon, N.D., Adams, S.F.: Recent developments in document image watermarking and data hiding. In: Proc. SPIE. vol. 4518, pp. 166–176(2001), http://dx.doi.org/10.1117/12.448201Google Scholar
  5. 5.
    Chuda, D., Navrat, P.: Support for checking plagiarism in e-learning. Procedia - Social and Behavioral Sciences 2(2), 3140–3144 (2010), http://www.sciencedirect.com/science/article/pii/S1877042810005185, innovation and Creativity in EducationGoogle Scholar
  6. 6.
    Ecma International: Office Open XML File Formats (4th edition). ECMA-376 (2012)Google Scholar
  7. 7.
    Heinrich, E., Milne, J., Moore, M.: An investigation into E-Tool use for formative assignment assessment | status and recommendations. J. of Educational Technology & Society 12(4), 176–192 (2009)Google Scholar
  8. 8.
    Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Trans. Information Forensics and Security 2(1), 24–30 (2007)Google Scholar
  9. 9.
    Meral, H.M., Sankur, B., Özsoy, A.S., Güngör, T., Sevinç, E.: Natural language watermarking via morphosyntactic alterations. Computer Speech & Language 23(1), 107–125 (2009), http://www.sciencedirect.com/science/article/pii/S0885230808000284Google Scholar
  10. 10.
    Mohamed, M.A., Altrafi, O.G., Ismail, M.O., Elobied, M.O.: A novel method to protect content of Microsoft Word document using cryptography and steganography. Int. J. of Computer Theory and Engineering 7(4), 292–296 (2015)Google Scholar
  11. 11.
    Organization, I.S.: Information technology – document description and processing languages – office open xml file formats. ISO/IEC-29500:2008 (2008)Google Scholar
  12. 12.
    Park, B., J.Park, Lee, S.: Data concealment and detection in Microsoft Office 2007 files. Digital Investigation 5, 104–114 (2009)Google Scholar
  13. 13.
    Petrus, K., Sankey, M.: Comparing Writely and Moodle online assignment submission and assessment. In: Proc. 3rd Int. Conf. on Pedagogies and Learning (2007)Google Scholar
  14. 14.
    Por, L.Y., Delina, B.: Information hiding: A new approach in text steganography. In: Proc. 7th WSEAS Int. Conf. on Applied Computer & Applied Computational Science (ACACOS ‘08), Hangzhou (2008)Google Scholar
  15. 15.
    Sarsoh, J.T., Hashem, K.M., Hendi, H.I.: An effective method for hidding data in microsoft word documents. Global Journal of Computer Science and Technology 12(12) (2012)Google Scholar
  16. 16.
    Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing. pp. 1524–1526. IEEE Computer Society, Los Alamitos, CA, USA (2008)Google Scholar
  17. 17.
    Tresnawati, D., R, A.S., Kuspriyanto: Plagiarism detection system design for programming assignment in virtual classroom based on Moodle. Procedia - Social and Behavioral Sciences 67, 114–122 (2012), http://www.sciencedirect.com/science/article/pii/S1877042812052986Google Scholar
  18. 18.
    Villáan, R., Voloshynovskiy, S., Koval, O., Vila, J., Topak, E., Deguillaume, F., Rytsar, Y., Pun, T.: Text data-hiding for digital and printed documents: theoretical and practical considerations. In: Proc. SPIE. vol. 6072, p. 607212 (2006), http://dx.doi.org/10.1117/12.641957Google Scholar
  19. 19.
    Zhong, S., Cheng, X., Chen, T.: Data hiding in a kind of PDF texts for secret communication. International Journal of Network Security 4 (2007)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Graduate School of EngineeringTohoku UniversitySendaiJapan

Personalised recommendations