Advertisement

A Large Payload Webpage Data Embedding Method Using CSS Attributes Modification

  • Jing-Xun Lai
  • Yung-Chen ChouEmail author
  • Chiung-Chen Tseng
  • Hsin-Chi Liao
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

The Internet provides an ideal environment for users to communicate with one another. Digitized data can be transmitted over the Internet almost instantly. More and more confidential data has been delivered and the amount will keep on increasing. How to achieve the security of confidential data delivery is a very important issue in this digital era. Data encryption may help to ensure the cipher data is difficult to decode by an unknown user but it may not guarantee the delivery of the confidential data. Data hiding technique is a solution for confidential data delivery. In this paper, an HTML file is used as the cover medium for delivering confidential data. By utilizing the exibility of the HTML webpage creation, the proposed method uses different CSS attribute settings to encode the secret message. Because there are various ways to set the CSS margin and padding attributes, the proposed method not only helps to achieve the goal of secret data delivery but also provides a large embedding payload. The simulation results demonstrate that a CSS tag with margin and padding attributes can embed up to 112 secret bits.

Keywords

HTML Data Hiding CSS Attribute 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Yang, Y. J. and Yang, Y. M: ‘An Efficient Webpage Information Hiding Method Based on Tag Attributes’, FSKD, 2010, 3, pp. 1181-1184Google Scholar
  2. 2.
    I. S. Lee and W.H. Tsai: ‘Secret communication through webpages using special space codes in html files’, IJASE, 2008, 6, pp. 141-149Google Scholar
  3. 3.
    Huang, H. J., Zhong, S. H., and Sun, X. M.: ‘An Algorithm of Webpage Information Hiding Based on Attributes Permutation’, IIHMSP, 2008, pp. 257-260Google Scholar
  4. 4.
    Chou, Y. C. and Huang, C. Y. and Liao, H. C.: ‘A reversible Data Hiding Scheme Using Cartesian Product for HTML File’, ICGEC, 2012, pp. 153-156Google Scholar
  5. 5.
    Chou, Y. C. and Liao, H. C.: ‘A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting’, IIHMSP, 2014Google Scholar
  6. 6.
    Fabien A. P. Petitcolas, Markus G. Kuhn and Ross J. Anderson: ‘Information Hiding-A Survey’, IEEE, 1999, pp. 1062-1078Google Scholar
  7. 7.
    Dey, S., Al-Qaheri, H., and Sanyal, S.: ‘Embedding Secret Data in HTML Web Page’, IPCC, 2009, pp. 474-481Google Scholar
  8. 8.
    Zhong, S., Cheng, X., and Chen, T.: ‘Data Hiding in a Kind of PDF Texts for Secret Communication’, IPCC, 2009, pp. 474-481Google Scholar
  9. 9.
    Wu, X. and Sun, W.: ‘High-capacity reversible data hiding in encrypted images by prediction error’, signal processing, 2014, 104, pp. 387-400Google Scholar
  10. 10.
    Liu, Y., Li, Z., Ma, X. and Liu, J.: ‘A robust data hiding algorithm for H.264/AVC video streams’, signal processing, 2013, 86, pp. 2174-2183Google Scholar
  11. 11.
    Lee, C. W. and Tsai, W. H.: ‘A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding’, JSS, 2013, 93, pp. 2010-2025Google Scholar
  12. 12.
    Ilchev, S. and Ilcheva, Z.: ‘A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments’, signal processing-Image, 2013, pp. 531-552Google Scholar
  13. 13.
    S.M. Elshoura, and D.B. Megherbi: ‘Modular Data Hiding as an Alternative of Classic Data Hiding for Web-based Applications’, ITC, 2012, pp. 9-15Google Scholar
  14. 14.
    Sui, X. G. and Luo, H.: ‘A New Steganography Method Based on Hypertext’, APRASC, 2004, pp. 181-184Google Scholar
  15. 15.
    Zhang, X., Zhao, G. and Niu, P.: ‘A Novel Approach of Secret Hiding in Webpage by Bit Grouping Technology’, JSW, 2012, pp. 2614-2621Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Jing-Xun Lai
    • 1
  • Yung-Chen Chou
    • 1
    Email author
  • Chiung-Chen Tseng
    • 1
  • Hsin-Chi Liao
    • 1
  1. 1.Department of Computer Sciences and Information EngineeringAsia UniversityTaichungTaiwan

Personalised recommendations