计算机科学 ›› 2024, Vol. 51 ›› Issue (5): 374-381.doi: 10.11896/jsjkx.230300192
韩松源, 王宏霞, 蒋子渝
HAN Songyuan, WANG Hongxia, JIANG Ziyu
摘要: Excel文档被广泛应用于金融财务、科学研究、数据分析、统计报告等领域,在教育培训、在线办公等诸多场景中扮演着重要角色,却也潜藏着违规使用、侵权行为和信息泄露等安全隐患。为保护Excel文档内容的安全,迫切需要研究更安全可靠的文档保护技术。文中基于Excel文档格式,提出了一种面向流动追踪的多层鲁棒Excel文档水印算法,该算法通过将多层水印信息嵌入Excel文档的单元格样式和边框的RGB颜色值中,从而能在实际应用场景中明确敏感文档传播链条,对文档泄露源头进行追踪溯源,定位泄密责任人,以减少信息泄露事件的发生。经实验对比发现,所提水印算法不可感知性好,对增加、删除、重新键入、格式刷、复制粘贴和另存为等多种常见文档操作和攻击具有很强的鲁棒性,同时支持多层水印嵌入。与其他基于文档格式的水印算法相比,所提算法具有更好的水印不可见性、更强的鲁棒性和更宽广的应用范围。
中图分类号:
[1]RESHETNIKOVA N,MAGOMEDOV M,BUKLANOV D.Digital finance technologies:threats and challenges to the global and national financial security[C]//IOP Conference Series:Earth and Environmental Science.IOP Publishing,2021. [2]China Internet Network Information Center.The 49th statistical report on Internet development in China[EB/OL].(2022-02-25).[2023-01-16].https://www.cnnic.net.cn/NMediaFile/old_attach/P020220721404263787858.pdf. [3]BABAPOUR CHAFI M,HULTBERG A,BOZIC YAMS N.Post-pandemic office work:Perceived challenges and opportunities for a sustainable work environment[J].Sustainability,2022,14(1):294. [4]ELIZABETH G.Microsoft Excel Statistics:Spreadsheets byNumbers[EB/OL].(2022-04-21).[2023-01-16].https://www.microbizmag.co.uk/microsoft-excel-statistics. [5]KRONTHALER F.Excel:A Brief Introduction to the Statistical Tools.In:Statistics Applied with Excel[M].Berlin:Springer,2023. [6]ANDERSON D R,SWEENEY D J,WILLIAMST A,et al.Essentials of modern business statistics with Microsoft Excel[M].Cengage Learning,2020. [7]LIU J P.Excel under the information technology application in financial management research[C]//2017 29th Chinese Control And Decision Conference(CCDC).IEEE,2017:2575-2578. [8]HSU C T,WU J L.Hidden digital watermarks in images[J].IEEE Transactions on Image Processing,1999,8(1):58-68. [9]PODILCHUK C I,DELP E J.Digital watermarking:algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46. [10]DITTMANN J,WOHLMACHER P,NAHRSTEDT K.Usingcryptographic and.watermarking algorithms[J].IEEE MultiMedia,2001,8(4):54-65. [11]LI Z C,WANG L M,GE S J,et al.A plain text watermarking method for big data based on orthogonal coding[J].Computer Science,2019,46(12):148-154. [12]XIAO C,ZHANG C,ZHENG C.Fontcode:Embedding information in text documents using glyph perturbation[J].ACM Transactions on Graphics(TOG),2018,37(2):1-16. [13]QIN C,JI P,CHANGC C,et al.Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery[J].IEEE MultiMedia,2018,25(3):36-48. [14]LIU Z,HUANG Y,HUANG J.Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1171-1180. [15]YANG L,WANG H,ZHANG Y,et al.A Robust DCT-BasedVideo Watermarking Scheme Against Recompression and Synchronization Attacks[C]//International Workshop on Digital Watermarking.Cham:Springer,2021:149-162. [16]SU Q,LIU D,SUN Y.A robust adaptive blind color image watermarking for resisting geometric attacks[J].Information Sciences,2022,606:194-212. [17]ZHANG Z,LI F,ZUO X,et al.Reversible image watermarking algorithm based on reverse histogram translation[J].Multime-dia Tools and Applications,2022,82:11005-11019. [18]DONG L,CHEN J,PENG C,et al.Watermark-Preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking[C]//2022 IEEE International Conference on Multimedia and Expo(ICME).IEEE,2022:1-6. [19]SUN J,LI Y,ZHANG G,et al.Data traceability scheme of industrial control system based on digital watermark[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:322-325. [20]ZHAO W J,GUAN H,HUANG Y,et al.A survey of text watermarking technology research[J].Journal of Communication University of China(Science and Technology),2020,27(6):55-62. [21]HORNG S J,ROSIYADI D,FAN P,et al.An adaptive watermarking scheme for e-government document images[J].Multimedia Tools and Applications,2014,72(3):3085-3103. [22]SINGH B,SHARMA M K.Efficient watermarking techniquefor protection and authentication of document images[J].Multimedia Tools and Applications,2022,81:22985-23005. [23]HUANG S,WU J K.Optical watermarking for printed document authentication[J].IEEE Transactions on Information Forensics and Security,2007,2(2):164-173. [24]SUZAKI M,SUTO M.A watermark embedding and extracting method for printed documents[J].Electronics and Communications in Japan(Part III:Fundamental Electronic Science),2005,88(7):43-51. [25]FANG H,ZHANG W,MA Z,et al.A camera shooting resilient watermarking scheme for underpainting documents[J].IEEE Transactions on Circuits and Systems for Video Technology,2019,30(11):4075-4089. [26]HILAL A M,AL-WESABI F N,ABDELMABOUD A,et al.A hybrid intelligent textwatermarking and natural language processing approach for transferring and receiving an authentic English text via internet[J].The Computer Journal,2022,65(2):423-435. [27]ABDELNABI S,FRITZ M.Adversarial watermarking trans-former:Towards tracing text provenance with data hiding[C]//2021 IEEE Symposium on Security and Privacy(SP).IEEE,2021:121-140. [28]ZHOU X,PENG W,YANG B,et al.Linguistic steganography based on adaptive probability distribution[J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):2982-2997. [29]BRASSIL J T,LOW S,MAXMCHUK N F,et al.Electronicmarking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,1995,13(8):1495-1504. [30]BRASSIL J T,LOW S,MAXEMCHUK N F.Copyright protection for the electronic distribution of text documents[J].Proceedings of the IEEE,1999,87(7):1181-1196. [31]HUANG H,QI C,LI J,et al.A new text digital watermarking strategy and detection method[J].Journal of Xi'an Jiaotong University,2002(2):165-168,181. [32]HUANG D,YAN H.Interword distance changes represented by sine waves for watermarking text images[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(12):1237-1245. [33]CHENG D,LI X,QI W,et al.A statistics-based watermarking scheme robust to print-and-scan[C]//2008 International Symposium on Electronic Commerce and Security.IEEE,2008:894-898. [34]LI Q C,DONG Z H.Novel textwatermarking algorithm basedon Chinese characters structure[C]//2008 International Symposium on Computer Science and Computational Technology.IEEE,2008:348-351. [35]QI W,GUO W,ZHANG T,et al.Robust authentication for paper-based text documents based on text watermarking technology[J].Mathematical Biosciences and Engineering,2019,16(4):2233-2249. [36]ALOTAIBI R A,ELREFAEI L A.Improved capacity Arabictext watermarking methods based on open word space[J].Journal of King Saud University-Computer and Information Sciences,2018,30(2):236-248. [37]AL-NOFAIE S M A,GUTUB A A A.Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications[J].Multimedia Tools and Applications,2020,79(1):19-67. [38]AHVANOOEY M T,LI Q,ZHU X,et al.ANiTW:A novel intelligent text watermarking technique for forensic identification of spurious information on social media[J].Computers & Secu-rity,2020,90:101702. [39]ZHANG Z Y,LI Q M,QI Y.Text watermark design based on invisible characters[J].Journal of Nanjing University of Science and Technology,2017,41(4):405-411. [40]LIU T Y,TSAI W H.A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique[J].IEEE Transactions on Information Forensics and Security,2007,2(1):24-30. [41]IQBAL M M,KHADAM U,HAN K J,et al.A robust digital watermarking algorithm for text document copyright protection based on feature coding[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:1940-1945. [42]YANG L,GUO W,LU Y,et al.Text Watermarking forOOXML format documents based on color transformation[C]//2019 IEEE International Conference on Intelligence and Security Informatics(ISI).IEEE,2019:155-157. [43]LIU Y,SUN X,LIU Y,et al.Mimic-ppt:Mimicking-based steganography for Microsoft PowerPoint document[J].Inform.Technol.J,2008,7:654-660. [44]YANG W C,CHEN L H.A steganographic method via various animations in PowerPoint files[J].Multimedia Tools and Applications,2015,74:1003-1019. [45]YANG B,SUN X,XIANG L,et al.Steganography in MS Excel document using text-rotation technique[J].Information Technology Journal,2011,10(4):889-893. [46]ALSAADI H I,AL-ANNIM K,ALMUTTAIRI R M,et al.Text steganography in font color of MS Excel sheet[C]//Proceedings of the First International Conference on Data Science,E-learning and Information Systems.2018:1-7. [47]RYMAN D,IMBRIE P K,KASTNER J.Enhancement of plagia-rism detection techniques via watermarking[C]//2022 IEEE Frontiers in Education Conference(FIE).IEEE,2022:1-5. [48]BITAR A W,DARAZI R,COUCHOT J F,et al.Blind digital watermarking in PDF documents using Spread Transform Dither Modulation[J].Multimedia Toolsand Applications,2017,76:143-161. [49]KURIBAYASHI M,WONG K S.StealthPDF:Data hidingmethod for PDF file with no visual degradation[J].Journal of Information Security and Applications,2021,61:102875. [50]FU Z,SUN X,LIU Y,et al.Text split-based steganography in OOXML format documents for covert communication[J].Secu-rity and Communication Networks,2012,5(9):957-968. [51]PADDLEPADDLE AI STUDIO.Summary of financial datasets[EB/OL].(2022-01-24)[2023-01-16].https://aistudio.baidu.com/aistudio/projectdetail/3441337. |
|