{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:11:03Z","timestamp":1654146663760},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<p>Data hiding is emerging as an important area of research with the advent of digital technologies. Watermarking, fingerprinting and steganography are important applications of data hiding techniques. Besides the classical use of data hiding in ownership protection, authentication and copy\/access control, it serves as a general tool to convey side information. New files are a good choice for steganographic carriers. In this paper, the authors use Microsoft Excel as a cover file. A methodology has been developed that consists of three techniques for embedding the valuable data with three layers of security and high robustness. The resultant stego Excel file can be transmitted anywhere using any channel. Experimental results show the feasibility of the proposed methodology.<\/p>","DOI":"10.4018\/jdcf.2011010103","type":"journal-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T17:46:05Z","timestamp":1354643165000},"page":"37-52","source":"Crossref","is-referenced-by-count":1,"title":["Microsoft Excel File"],"prefix":"10.4018","volume":"3","author":[{"given":"Rajesh Kumar","family":"Tiwari","sequence":"first","affiliation":[{"name":"GLA Institute of Technology & Management, India"}]},{"given":"G.","family":"Sahoo","sequence":"additional","affiliation":[{"name":"BIT Mesra, India"}]}],"member":"2432","reference":[{"key":"jdcf.2011010103-0","doi-asserted-by":"crossref","unstructured":"Amin, M. M., Ibrahim, S., Salleh, M., & Katmin, M. R. (2003). Information hiding using steganography. Retrieved from http:\/\/eprints.utm.my\/4339\/1\/71847","DOI":"10.1109\/NCTT.2003.1188294"},{"key":"jdcf.2011010103-1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"jdcf.2011010103-2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935180"},{"issue":"3-4","key":"jdcf.2011010103-3","article-title":"Techniques for data hiding.","volume":"35","author":"W.Bender","year":"1996","journal-title":"IBM Systems Journal"},{"key":"jdcf.2011010103-4","doi-asserted-by":"crossref","unstructured":"Cachin, C. (1998). An information\u2013theoretic model for steganography. In Proceedings of the 2nd Information Hiding Workshop (LNCS 1525, pp. 303-318).","DOI":"10.1007\/3-540-49380-8_21"},{"key":"jdcf.2011010103-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.006"},{"key":"jdcf.2011010103-6","doi-asserted-by":"crossref","unstructured":"Craver, S. (1998). On public-key steganography in the presence of an active warden. In Proceedings of the 2nd Information Hiding Workshop (LNCS 1525, pp. 355-368).","DOI":"10.1007\/3-540-49380-8_25"},{"key":"jdcf.2011010103-7","doi-asserted-by":"crossref","unstructured":"Gutub, A., Al-Qahtani, A., & Tabakh, A. (2009). Triple-A: Secure RGB image steganography based on randomization. In Proceedings of the International Conference on Computer Systems and Applications (pp. 400-403).","DOI":"10.1109\/AICCSA.2009.5069356"},{"key":"jdcf.2011010103-8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"issue":"20","key":"jdcf.2011010103-9","first-page":"557","article-title":"A new approach to covert communication via PDF files.","volume":"90","author":"I.-S.Lee","year":"2008","journal-title":"Signal Processing"},{"key":"jdcf.2011010103-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890310"},{"key":"jdcf.2011010103-11","doi-asserted-by":"crossref","unstructured":"Marvel, L., & Retter, C. (1998). A methodology for data hiding using images. Retrieved from http:\/\/www.research.telcordia.com\/society\/TacCom\/papers98\/30_07i","DOI":"10.1109\/MILCOM.1998.727007"},{"key":"jdcf.2011010103-12","doi-asserted-by":"crossref","unstructured":"Mathkour, H., Al-Sadoon, B., & Touir, A. (2008). A new image steganography technique. In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1-4).","DOI":"10.1109\/WiCom.2008.2918"},{"key":"jdcf.2011010103-13","unstructured":"Peticolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding \u2013 a survey. Retrieved from http:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/ieee99-infohiding"},{"key":"jdcf.2011010103-14","doi-asserted-by":"crossref","unstructured":"Potdar, V., Han, S., & Chang, E. (2005). Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel. In Proceedings of the 3rd International Conference on Industrial Informatics (pp. 697-700).","DOI":"10.1109\/INDIN.2005.1560460"},{"key":"jdcf.2011010103-15","doi-asserted-by":"crossref","unstructured":"Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT, and compression techniques on raw images. In Proceedings of the 2005 3rd International Conference on Intelligent Sensing and Information Processing (pp. 170-176).","DOI":"10.1109\/ICISIP.2005.1619431"},{"issue":"1","key":"jdcf.2011010103-16","article-title":"Designing an embedded algorithm for data hiding using steganographic technique by file hybridization.","volume":"8","author":"G.Sahoo","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"1","key":"jdcf.2011010103-17","first-page":"25","article-title":"Some new methodologies for image hiding using steganographic techniques.","volume":"1","author":"G.Sahoo","year":"2008","journal-title":"International Journal of Information Analysis and Processing"},{"key":"jdcf.2011010103-18","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIS.2010.036074"},{"issue":"2","key":"jdcf.2011010103-19","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1504\/IJESDF.2010.033781","article-title":"Some new methodologies for secured data coding and transmission.","volume":"3","author":"G.Sahoo","year":"2010","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"jdcf.2011010103-20","doi-asserted-by":"crossref","unstructured":"Shejul, A. A., & Kulkarni, U. L. (2010). A DWT based approach for steganography using biometrics. In Proceedings of the International Conference on Data Storage and Data Engineering, Bangalore, India (pp. 39-43).","DOI":"10.1109\/DSDE.2010.10"},{"key":"jdcf.2011010103-21","unstructured":"Swanson, M., Zhu, B., & Tewfik, A. (1996). Transparent robust image watermaking. Retrieved from http:\/\/reference.kfupm.edu.sa\/content\/t\/r\/transparent_robust_image_watermarking__14673"},{"key":"jdcf.2011010103-22","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2010.032329"},{"key":"jdcf.2011010103-23","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286660"},{"key":"jdcf.2011010103-24","unstructured":"Zou, D., & Shi, Y. Q. (2005). Formatted text document data hiding robust to printing, copying and scanning. In Proceedings of the Circuits and Systems International Symposium (pp. 4971-4974)."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=52777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:02:37Z","timestamp":1654106557000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011010103"}},"subtitle":["A Steganographic Carrier File"],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011010103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}