%0 Conference Proceedings %T New Steganographic Techniques for the OOXML File Format %+ Università degli Studi di Salerno = University of Salerno (UNISA) %+ Seconda Università degli Studi di Napoli = Second University of Naples %A Castiglione, Aniello %A D’alessio, Bonaventura %A Santis, Alfredo, De %A Palmieri, Francesco %Z Part 2: Workshop %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st Availability, Reliability and Security (CD-ARES) %C Vienna, Austria %Y A Min Tjoa %Y Gerald Quirchmayr %Y Ilsun You %Y Lida Xu %I Springer %3 Availability, Reliability and Security for Business, Enterprise and Health Information Systems %V LNCS-6908 %P 344-358 %8 2011-08-22 %D 2011 %R 10.1007/978-3-642-23300-5_27 %K Steganography %K OOXML Format %K Stegosystem %K Document Steganography %K Microsoft Office Document %K Information Hiding %K Document Metadata %K Covert Channel %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X The simplest container of digital information is the file and among the vast array of files currently available, MS-Office files are the most widely used. The “Microsoft Compound Document File Format” (MCDFF) has often been used to host secret information. The new format created by Microsoft, first used with MS-Office 2007, makes use of a new standard, the “Office Open XML Formats” (OOXML). The benefits include that the new format introduces the OOXML format, which lowers the risk of information leakage, as well as the use of MS-Office files as containers for steganography.This work presents some new methods of embedding information into the OOXML file format which can be extremely useful when using MS-Office documents in steganography. The authors highlight how the new methods introduced in this paper can also be used in many other scenarios, not only in MS-Office documents. An evaluation of the limits of the proposed methods is carried out by comparing them against the tool introduced by Microsoft to sanitize MS-Office files. The methods presented can be combined in order to extend the amount of data to be hidden in a single cover file. %G English %Z TC 8 %Z WG 8.4 %Z WG 8.9 %2 https://inria.hal.science/hal-01590389/document %2 https://inria.hal.science/hal-01590389/file/978-3-642-23300-5_27_Chapter.pdf %L hal-01590389 %U https://inria.hal.science/hal-01590389 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-CD-ARES %~ IFIP-WG8-4 %~ IFIP-WG8-9 %~ IFIP-LNCS-6908