计算机科学 ›› 2024, Vol. 51 ›› Issue (5): 374-381.doi: 10.11896/jsjkx.230300192

• 信息安全 • 上一篇    下一篇

面向流动追踪的多层鲁棒Excel文档水印

韩松源, 王宏霞, 蒋子渝   

  1. 四川大学网络空间安全学院 成都 610065
  • 收稿日期:2023-03-24 修回日期:2023-07-24 出版日期:2024-05-15 发布日期:2024-05-08
  • 通讯作者: 王宏霞(hxwang@scu.edu.cn)
  • 作者简介:(hansongyuan@stu.scu.edu.cn)
  • 基金资助:
    国家自然科学基金(62272331)

Robust and Multilayer Excel Document Watermarking for Source Tracing

HAN Songyuan, WANG Hongxia, JIANG Ziyu   

  1. School of Cyber Science and Engineering,Sichuan University,Chengdu 610065,China
  • Received:2023-03-24 Revised:2023-07-24 Online:2024-05-15 Published:2024-05-08
  • About author:HAN Songyuan,born in 2000,postgra-duate.His main research interests include multimedia security and digital watermarking.
    WANG Hongxia,born in 1973,Ph.D,professor,Ph.D supervisor.Her main research interests include multimedia security,digital forensics,information hiding and digital watermarking.
  • Supported by:
    National Natural Science Foundation of China(62272331).

摘要: Excel文档被广泛应用于金融财务、科学研究、数据分析、统计报告等领域,在教育培训、在线办公等诸多场景中扮演着重要角色,却也潜藏着违规使用、侵权行为和信息泄露等安全隐患。为保护Excel文档内容的安全,迫切需要研究更安全可靠的文档保护技术。文中基于Excel文档格式,提出了一种面向流动追踪的多层鲁棒Excel文档水印算法,该算法通过将多层水印信息嵌入Excel文档的单元格样式和边框的RGB颜色值中,从而能在实际应用场景中明确敏感文档传播链条,对文档泄露源头进行追踪溯源,定位泄密责任人,以减少信息泄露事件的发生。经实验对比发现,所提水印算法不可感知性好,对增加、删除、重新键入、格式刷、复制粘贴和另存为等多种常见文档操作和攻击具有很强的鲁棒性,同时支持多层水印嵌入。与其他基于文档格式的水印算法相比,所提算法具有更好的水印不可见性、更强的鲁棒性和更宽广的应用范围。

关键词: Excel, 文档水印, 鲁棒性, 多层嵌入, 追踪溯源

Abstract: Excel documents are widely used in finance,scientific research,data analysis and statistical reporting,and play an increasingly important role in education and training,online offices and many other scenarios,but they also pose security risks such as unauthorised use,infringement and information leakage.To protect the security of digital content of Excel documents,there is a vital need to develop more secure and reliable document watermarking algorithms.This paper proposes a source tracing multilayer watermarking algorithm for Excel documents with good invisibility and robustness based on the Excel document format.By embedding multilayer watermark information into the cell style and RGB color values of the border of Excel documents,it can clarify the document distribution chain in practical application scenarios,trace the source of document leakage and locate the person responsible for the leakage.The proposed algorithm can be used to reduce the occurrence of information leakage.Experimental comparisons show that the proposed method is imperceptible to watermarks,robust to a wide range of common attacks,and supports multilayer watermark embedding of up to five layers.Compared with other document format-based watermarking algorithms,the proposed algorithm has better watermark invisibility,stronger robustness and a wider range of applications.

Key words: Excel, Document watermarking, Robustness, Multilayer embedding, Source tracing

中图分类号: 

  • TP391
[1]RESHETNIKOVA N,MAGOMEDOV M,BUKLANOV D.Digital finance technologies:threats and challenges to the global and national financial security[C]//IOP Conference Series:Earth and Environmental Science.IOP Publishing,2021.
[2]China Internet Network Information Center.The 49th statistical report on Internet development in China[EB/OL].(2022-02-25).[2023-01-16].https://www.cnnic.net.cn/NMediaFile/old_attach/P020220721404263787858.pdf.
[3]BABAPOUR CHAFI M,HULTBERG A,BOZIC YAMS N.Post-pandemic office work:Perceived challenges and opportunities for a sustainable work environment[J].Sustainability,2022,14(1):294.
[4]ELIZABETH G.Microsoft Excel Statistics:Spreadsheets byNumbers[EB/OL].(2022-04-21).[2023-01-16].https://www.microbizmag.co.uk/microsoft-excel-statistics.
[5]KRONTHALER F.Excel:A Brief Introduction to the Statistical Tools.In:Statistics Applied with Excel[M].Berlin:Springer,2023.
[6]ANDERSON D R,SWEENEY D J,WILLIAMST A,et al.Essentials of modern business statistics with Microsoft Excel[M].Cengage Learning,2020.
[7]LIU J P.Excel under the information technology application in financial management research[C]//2017 29th Chinese Control And Decision Conference(CCDC).IEEE,2017:2575-2578.
[8]HSU C T,WU J L.Hidden digital watermarks in images[J].IEEE Transactions on Image Processing,1999,8(1):58-68.
[9]PODILCHUK C I,DELP E J.Digital watermarking:algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46.
[10]DITTMANN J,WOHLMACHER P,NAHRSTEDT K.Usingcryptographic and.watermarking algorithms[J].IEEE MultiMedia,2001,8(4):54-65.
[11]LI Z C,WANG L M,GE S J,et al.A plain text watermarking method for big data based on orthogonal coding[J].Computer Science,2019,46(12):148-154.
[12]XIAO C,ZHANG C,ZHENG C.Fontcode:Embedding information in text documents using glyph perturbation[J].ACM Transactions on Graphics(TOG),2018,37(2):1-16.
[13]QIN C,JI P,CHANGC C,et al.Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery[J].IEEE MultiMedia,2018,25(3):36-48.
[14]LIU Z,HUANG Y,HUANG J.Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1171-1180.
[15]YANG L,WANG H,ZHANG Y,et al.A Robust DCT-BasedVideo Watermarking Scheme Against Recompression and Synchronization Attacks[C]//International Workshop on Digital Watermarking.Cham:Springer,2021:149-162.
[16]SU Q,LIU D,SUN Y.A robust adaptive blind color image watermarking for resisting geometric attacks[J].Information Sciences,2022,606:194-212.
[17]ZHANG Z,LI F,ZUO X,et al.Reversible image watermarking algorithm based on reverse histogram translation[J].Multime-dia Tools and Applications,2022,82:11005-11019.
[18]DONG L,CHEN J,PENG C,et al.Watermark-Preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking[C]//2022 IEEE International Conference on Multimedia and Expo(ICME).IEEE,2022:1-6.
[19]SUN J,LI Y,ZHANG G,et al.Data traceability scheme of industrial control system based on digital watermark[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:322-325.
[20]ZHAO W J,GUAN H,HUANG Y,et al.A survey of text watermarking technology research[J].Journal of Communication University of China(Science and Technology),2020,27(6):55-62.
[21]HORNG S J,ROSIYADI D,FAN P,et al.An adaptive watermarking scheme for e-government document images[J].Multimedia Tools and Applications,2014,72(3):3085-3103.
[22]SINGH B,SHARMA M K.Efficient watermarking techniquefor protection and authentication of document images[J].Multimedia Tools and Applications,2022,81:22985-23005.
[23]HUANG S,WU J K.Optical watermarking for printed document authentication[J].IEEE Transactions on Information Forensics and Security,2007,2(2):164-173.
[24]SUZAKI M,SUTO M.A watermark embedding and extracting method for printed documents[J].Electronics and Communications in Japan(Part III:Fundamental Electronic Science),2005,88(7):43-51.
[25]FANG H,ZHANG W,MA Z,et al.A camera shooting resilient watermarking scheme for underpainting documents[J].IEEE Transactions on Circuits and Systems for Video Technology,2019,30(11):4075-4089.
[26]HILAL A M,AL-WESABI F N,ABDELMABOUD A,et al.A hybrid intelligent textwatermarking and natural language processing approach for transferring and receiving an authentic English text via internet[J].The Computer Journal,2022,65(2):423-435.
[27]ABDELNABI S,FRITZ M.Adversarial watermarking trans-former:Towards tracing text provenance with data hiding[C]//2021 IEEE Symposium on Security and Privacy(SP).IEEE,2021:121-140.
[28]ZHOU X,PENG W,YANG B,et al.Linguistic steganography based on adaptive probability distribution[J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):2982-2997.
[29]BRASSIL J T,LOW S,MAXMCHUK N F,et al.Electronicmarking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,1995,13(8):1495-1504.
[30]BRASSIL J T,LOW S,MAXEMCHUK N F.Copyright protection for the electronic distribution of text documents[J].Proceedings of the IEEE,1999,87(7):1181-1196.
[31]HUANG H,QI C,LI J,et al.A new text digital watermarking strategy and detection method[J].Journal of Xi'an Jiaotong University,2002(2):165-168,181.
[32]HUANG D,YAN H.Interword distance changes represented by sine waves for watermarking text images[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(12):1237-1245.
[33]CHENG D,LI X,QI W,et al.A statistics-based watermarking scheme robust to print-and-scan[C]//2008 International Symposium on Electronic Commerce and Security.IEEE,2008:894-898.
[34]LI Q C,DONG Z H.Novel textwatermarking algorithm basedon Chinese characters structure[C]//2008 International Symposium on Computer Science and Computational Technology.IEEE,2008:348-351.
[35]QI W,GUO W,ZHANG T,et al.Robust authentication for paper-based text documents based on text watermarking technology[J].Mathematical Biosciences and Engineering,2019,16(4):2233-2249.
[36]ALOTAIBI R A,ELREFAEI L A.Improved capacity Arabictext watermarking methods based on open word space[J].Journal of King Saud University-Computer and Information Sciences,2018,30(2):236-248.
[37]AL-NOFAIE S M A,GUTUB A A A.Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications[J].Multimedia Tools and Applications,2020,79(1):19-67.
[38]AHVANOOEY M T,LI Q,ZHU X,et al.ANiTW:A novel intelligent text watermarking technique for forensic identification of spurious information on social media[J].Computers & Secu-rity,2020,90:101702.
[39]ZHANG Z Y,LI Q M,QI Y.Text watermark design based on invisible characters[J].Journal of Nanjing University of Science and Technology,2017,41(4):405-411.
[40]LIU T Y,TSAI W H.A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique[J].IEEE Transactions on Information Forensics and Security,2007,2(1):24-30.
[41]IQBAL M M,KHADAM U,HAN K J,et al.A robust digital watermarking algorithm for text document copyright protection based on feature coding[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:1940-1945.
[42]YANG L,GUO W,LU Y,et al.Text Watermarking forOOXML format documents based on color transformation[C]//2019 IEEE International Conference on Intelligence and Security Informatics(ISI).IEEE,2019:155-157.
[43]LIU Y,SUN X,LIU Y,et al.Mimic-ppt:Mimicking-based steganography for Microsoft PowerPoint document[J].Inform.Technol.J,2008,7:654-660.
[44]YANG W C,CHEN L H.A steganographic method via various animations in PowerPoint files[J].Multimedia Tools and Applications,2015,74:1003-1019.
[45]YANG B,SUN X,XIANG L,et al.Steganography in MS Excel document using text-rotation technique[J].Information Technology Journal,2011,10(4):889-893.
[46]ALSAADI H I,AL-ANNIM K,ALMUTTAIRI R M,et al.Text steganography in font color of MS Excel sheet[C]//Proceedings of the First International Conference on Data Science,E-learning and Information Systems.2018:1-7.
[47]RYMAN D,IMBRIE P K,KASTNER J.Enhancement of plagia-rism detection techniques via watermarking[C]//2022 IEEE Frontiers in Education Conference(FIE).IEEE,2022:1-5.
[48]BITAR A W,DARAZI R,COUCHOT J F,et al.Blind digital watermarking in PDF documents using Spread Transform Dither Modulation[J].Multimedia Toolsand Applications,2017,76:143-161.
[49]KURIBAYASHI M,WONG K S.StealthPDF:Data hidingmethod for PDF file with no visual degradation[J].Journal of Information Security and Applications,2021,61:102875.
[50]FU Z,SUN X,LIU Y,et al.Text split-based steganography in OOXML format documents for covert communication[J].Secu-rity and Communication Networks,2012,5(9):957-968.
[51]PADDLEPADDLE AI STUDIO.Summary of financial datasets[EB/OL].(2022-01-24)[2023-01-16].https://aistudio.baidu.com/aistudio/projectdetail/3441337.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!