{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:40:37Z","timestamp":1654123237593},"reference-count":19,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10,1]]},"abstract":"<p>One of the major characteristic of cryptography and steganography is unlimited and limited secret data conversion and embedding respectively. In steganography, concealing unlimited secret data in cover media is unfeasible. Majority of researchers have taken image, text, html, executable files as a steganographic cover media. In this proposed work the authors have considered Microsoft Power Point Files as a cover medium. The authors have developed a methodology which consist two techniques for embedding the valuable unlimited data with three layers of security and high robustness. The resultant stego file undoubtedly can be transmitted any where using any channel. Experimental results show the feasibility of the proposed methodology.<\/p>","DOI":"10.4018\/jdcf.2011100102","type":"journal-article","created":{"date-parts":[[2012,1,13]],"date-time":"2012-01-13T16:38:20Z","timestamp":1326472700000},"page":"16-28","source":"Crossref","is-referenced-by-count":0,"title":["Microsoft Power Point Files"],"prefix":"10.4018","volume":"3","author":[{"given":"Rajesh Kumar","family":"Tiwari","sequence":"first","affiliation":[{"name":"RVS College of Engineering & Technology, India"}]},{"given":"G.","family":"Sahoo","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology (BIT) Mesra, India"}]}],"member":"2432","reference":[{"key":"jdcf.2011100102-0","unstructured":"Allan, R. A. (2001). Microsoft in the 1980s. In R. A. Allan (Ed.), A history of the personal computer: The people and the technology (1st ed., pp. 12-13). London, ON, Canada: Allan. Retrieved from http:\/\/www.retrocomputing.net\/info\/allan\/eBook12.PowerPoint"},{"key":"jdcf.2011100102-1","doi-asserted-by":"crossref","unstructured":"Amin, M. M., Salleh, M., Ibrahim, S., Katmin, M. R., & Shamsuddin, M. Z. I. (2003). Information hiding using steganography. In Proceedings of the 4th National Conference on Telecommunication Technology (pp. 21-25).","DOI":"10.1109\/NCTT.2003.1188294"},{"key":"jdcf.2011100102-2","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"jdcf.2011100102-3","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935180"},{"issue":"3-4","key":"jdcf.2011100102-4","article-title":"Techniques for data hiding.","volume":"35","author":"W.Bender","year":"1996","journal-title":"IBM Systems Journal"},{"key":"jdcf.2011100102-5","doi-asserted-by":"crossref","unstructured":"Cachin, C. (1998). An information-theoretic model for steganography. In D. Aucsmith (Ed.), Proceedings of the 2nd International Workshop on Information Hiding (LNCS 1525, pp. 306-318).","DOI":"10.1007\/3-540-49380-8_21"},{"key":"jdcf.2011100102-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.006"},{"key":"jdcf.2011100102-7","first-page":"309","author":"B.Dunbar","year":"2002","journal-title":"A detailed look at steganography techniques and their use in an open systems environment"},{"key":"jdcf.2011100102-8","doi-asserted-by":"crossref","unstructured":"Gutub, A., Al-Qahtani, A., & Tabakh, A. (2009). Triple-A: Secure RGB image steganography based on randomization. In Proceedings of the IEEE\/ACS International Conference on Computer Systems and Applications (pp. 400-403).","DOI":"10.1109\/AICCSA.2009.5069356"},{"issue":"2","key":"jdcf.2011100102-9","first-page":"26","article-title":"Exploring steganography: Seeing the unseen.","volume":"31","author":"N. F.Johnson","year":"1998","journal-title":"Computers & Security"},{"key":"jdcf.2011100102-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.890310"},{"key":"jdcf.2011100102-11","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"jdcf.2011100102-12","doi-asserted-by":"crossref","unstructured":"Raja, K. B., Chowdary, C. R., Venugopal, K. R., & Patnaik, L. M. (2005). A secure image steganography using LSB, DCT, and compression techniques on raw images. In Proceedings of the Third International Conference on Intelligent Sensing and Information Processing (pp. 170-176).","DOI":"10.1109\/ICISIP.2005.1619431"},{"issue":"1","key":"jdcf.2011100102-13","article-title":"Designing an embedded algorithm for data hiding using steganographic technique by file hybridization.","volume":"8","author":"G.Sahoo","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"key":"jdcf.2011100102-14","doi-asserted-by":"crossref","unstructured":"Shejul, A. A., & Kulkarni, U. L. (2010). A DWT based approach for steganography using biometrics. In Proceedings of the IEEE International Conference on Data Storage and Data Engineering, Bangalore, India (pp. 39-43).","DOI":"10.1109\/DSDE.2010.10"},{"key":"jdcf.2011100102-15","doi-asserted-by":"crossref","unstructured":"Sutaone, M. S., & Khandare, M. V. (2008). Image based steganography using LSB insertion technique. In Proceedings of the IET International Conference on Wireless, Mobile and Multimedia Networks (pp. 146-151).","DOI":"10.1049\/cp:20080166"},{"key":"jdcf.2011100102-16","doi-asserted-by":"crossref","unstructured":"Swanson, M. D., Zhu, B., & Tewfik, A. H. (1996). Transparent robust image watermaking. In Proceedings of the International Conference on Image Processing (pp. 211-214).","DOI":"10.1109\/ICIP.1996.560421"},{"key":"jdcf.2011100102-17","doi-asserted-by":"crossref","unstructured":"Yan, W., & Ping, L.-d. (2009). A new steganography algorithm based on spatial domain. In Proceedings of the Second International Symposium on Information Science and Engineering (pp. 171-176).","DOI":"10.1109\/ISISE.2009.8"},{"key":"jdcf.2011100102-18","unstructured":"Zou, D., & Shi, Y. Q. (2005). Formatted text document data hiding robust to printing, copying and scanning. In Proceedings of the IEEE International Symposium Circuits and Systems (Vol. 5, pp. 4971-4974)."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=62075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:16:41Z","timestamp":1654121801000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011100102"}},"subtitle":["A Secure Steganographic Carrier"],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011100102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}