Computer Science ›› 2024, Vol. 51 ›› Issue (5): 374-381.doi: 10.11896/jsjkx.230300192

• Information Security • Previous Articles     Next Articles

Robust and Multilayer Excel Document Watermarking for Source Tracing

HAN Songyuan, WANG Hongxia, JIANG Ziyu   

  1. School of Cyber Science and Engineering,Sichuan University,Chengdu 610065,China
  • Received:2023-03-24 Revised:2023-07-24 Online:2024-05-15 Published:2024-05-08
  • About author:HAN Songyuan,born in 2000,postgra-duate.His main research interests include multimedia security and digital watermarking.
    WANG Hongxia,born in 1973,Ph.D,professor,Ph.D supervisor.Her main research interests include multimedia security,digital forensics,information hiding and digital watermarking.
  • Supported by:
    National Natural Science Foundation of China(62272331).

Abstract: Excel documents are widely used in finance,scientific research,data analysis and statistical reporting,and play an increasingly important role in education and training,online offices and many other scenarios,but they also pose security risks such as unauthorised use,infringement and information leakage.To protect the security of digital content of Excel documents,there is a vital need to develop more secure and reliable document watermarking algorithms.This paper proposes a source tracing multilayer watermarking algorithm for Excel documents with good invisibility and robustness based on the Excel document format.By embedding multilayer watermark information into the cell style and RGB color values of the border of Excel documents,it can clarify the document distribution chain in practical application scenarios,trace the source of document leakage and locate the person responsible for the leakage.The proposed algorithm can be used to reduce the occurrence of information leakage.Experimental comparisons show that the proposed method is imperceptible to watermarks,robust to a wide range of common attacks,and supports multilayer watermark embedding of up to five layers.Compared with other document format-based watermarking algorithms,the proposed algorithm has better watermark invisibility,stronger robustness and a wider range of applications.

Key words: Excel, Document watermarking, Robustness, Multilayer embedding, Source tracing

CLC Number: 

  • TP391
[1]RESHETNIKOVA N,MAGOMEDOV M,BUKLANOV D.Digital finance technologies:threats and challenges to the global and national financial security[C]//IOP Conference Series:Earth and Environmental Science.IOP Publishing,2021.
[2]China Internet Network Information Center.The 49th statistical report on Internet development in China[EB/OL].(2022-02-25).[2023-01-16].https://www.cnnic.net.cn/NMediaFile/old_attach/P020220721404263787858.pdf.
[3]BABAPOUR CHAFI M,HULTBERG A,BOZIC YAMS N.Post-pandemic office work:Perceived challenges and opportunities for a sustainable work environment[J].Sustainability,2022,14(1):294.
[4]ELIZABETH G.Microsoft Excel Statistics:Spreadsheets byNumbers[EB/OL].(2022-04-21).[2023-01-16].https://www.microbizmag.co.uk/microsoft-excel-statistics.
[5]KRONTHALER F.Excel:A Brief Introduction to the Statistical Tools.In:Statistics Applied with Excel[M].Berlin:Springer,2023.
[6]ANDERSON D R,SWEENEY D J,WILLIAMST A,et al.Essentials of modern business statistics with Microsoft Excel[M].Cengage Learning,2020.
[7]LIU J P.Excel under the information technology application in financial management research[C]//2017 29th Chinese Control And Decision Conference(CCDC).IEEE,2017:2575-2578.
[8]HSU C T,WU J L.Hidden digital watermarks in images[J].IEEE Transactions on Image Processing,1999,8(1):58-68.
[9]PODILCHUK C I,DELP E J.Digital watermarking:algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46.
[10]DITTMANN J,WOHLMACHER P,NAHRSTEDT K.Usingcryptographic and.watermarking algorithms[J].IEEE MultiMedia,2001,8(4):54-65.
[11]LI Z C,WANG L M,GE S J,et al.A plain text watermarking method for big data based on orthogonal coding[J].Computer Science,2019,46(12):148-154.
[12]XIAO C,ZHANG C,ZHENG C.Fontcode:Embedding information in text documents using glyph perturbation[J].ACM Transactions on Graphics(TOG),2018,37(2):1-16.
[13]QIN C,JI P,CHANGC C,et al.Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery[J].IEEE MultiMedia,2018,25(3):36-48.
[14]LIU Z,HUANG Y,HUANG J.Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1171-1180.
[15]YANG L,WANG H,ZHANG Y,et al.A Robust DCT-BasedVideo Watermarking Scheme Against Recompression and Synchronization Attacks[C]//International Workshop on Digital Watermarking.Cham:Springer,2021:149-162.
[16]SU Q,LIU D,SUN Y.A robust adaptive blind color image watermarking for resisting geometric attacks[J].Information Sciences,2022,606:194-212.
[17]ZHANG Z,LI F,ZUO X,et al.Reversible image watermarking algorithm based on reverse histogram translation[J].Multime-dia Tools and Applications,2022,82:11005-11019.
[18]DONG L,CHEN J,PENG C,et al.Watermark-Preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking[C]//2022 IEEE International Conference on Multimedia and Expo(ICME).IEEE,2022:1-6.
[19]SUN J,LI Y,ZHANG G,et al.Data traceability scheme of industrial control system based on digital watermark[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:322-325.
[20]ZHAO W J,GUAN H,HUANG Y,et al.A survey of text watermarking technology research[J].Journal of Communication University of China(Science and Technology),2020,27(6):55-62.
[21]HORNG S J,ROSIYADI D,FAN P,et al.An adaptive watermarking scheme for e-government document images[J].Multimedia Tools and Applications,2014,72(3):3085-3103.
[22]SINGH B,SHARMA M K.Efficient watermarking techniquefor protection and authentication of document images[J].Multimedia Tools and Applications,2022,81:22985-23005.
[23]HUANG S,WU J K.Optical watermarking for printed document authentication[J].IEEE Transactions on Information Forensics and Security,2007,2(2):164-173.
[24]SUZAKI M,SUTO M.A watermark embedding and extracting method for printed documents[J].Electronics and Communications in Japan(Part III:Fundamental Electronic Science),2005,88(7):43-51.
[25]FANG H,ZHANG W,MA Z,et al.A camera shooting resilient watermarking scheme for underpainting documents[J].IEEE Transactions on Circuits and Systems for Video Technology,2019,30(11):4075-4089.
[26]HILAL A M,AL-WESABI F N,ABDELMABOUD A,et al.A hybrid intelligent textwatermarking and natural language processing approach for transferring and receiving an authentic English text via internet[J].The Computer Journal,2022,65(2):423-435.
[27]ABDELNABI S,FRITZ M.Adversarial watermarking trans-former:Towards tracing text provenance with data hiding[C]//2021 IEEE Symposium on Security and Privacy(SP).IEEE,2021:121-140.
[28]ZHOU X,PENG W,YANG B,et al.Linguistic steganography based on adaptive probability distribution[J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):2982-2997.
[29]BRASSIL J T,LOW S,MAXMCHUK N F,et al.Electronicmarking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,1995,13(8):1495-1504.
[30]BRASSIL J T,LOW S,MAXEMCHUK N F.Copyright protection for the electronic distribution of text documents[J].Proceedings of the IEEE,1999,87(7):1181-1196.
[31]HUANG H,QI C,LI J,et al.A new text digital watermarking strategy and detection method[J].Journal of Xi'an Jiaotong University,2002(2):165-168,181.
[32]HUANG D,YAN H.Interword distance changes represented by sine waves for watermarking text images[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(12):1237-1245.
[33]CHENG D,LI X,QI W,et al.A statistics-based watermarking scheme robust to print-and-scan[C]//2008 International Symposium on Electronic Commerce and Security.IEEE,2008:894-898.
[34]LI Q C,DONG Z H.Novel textwatermarking algorithm basedon Chinese characters structure[C]//2008 International Symposium on Computer Science and Computational Technology.IEEE,2008:348-351.
[35]QI W,GUO W,ZHANG T,et al.Robust authentication for paper-based text documents based on text watermarking technology[J].Mathematical Biosciences and Engineering,2019,16(4):2233-2249.
[36]ALOTAIBI R A,ELREFAEI L A.Improved capacity Arabictext watermarking methods based on open word space[J].Journal of King Saud University-Computer and Information Sciences,2018,30(2):236-248.
[37]AL-NOFAIE S M A,GUTUB A A A.Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications[J].Multimedia Tools and Applications,2020,79(1):19-67.
[38]AHVANOOEY M T,LI Q,ZHU X,et al.ANiTW:A novel intelligent text watermarking technique for forensic identification of spurious information on social media[J].Computers & Secu-rity,2020,90:101702.
[39]ZHANG Z Y,LI Q M,QI Y.Text watermark design based on invisible characters[J].Journal of Nanjing University of Science and Technology,2017,41(4):405-411.
[40]LIU T Y,TSAI W H.A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique[J].IEEE Transactions on Information Forensics and Security,2007,2(1):24-30.
[41]IQBAL M M,KHADAM U,HAN K J,et al.A robust digital watermarking algorithm for text document copyright protection based on feature coding[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:1940-1945.
[42]YANG L,GUO W,LU Y,et al.Text Watermarking forOOXML format documents based on color transformation[C]//2019 IEEE International Conference on Intelligence and Security Informatics(ISI).IEEE,2019:155-157.
[43]LIU Y,SUN X,LIU Y,et al.Mimic-ppt:Mimicking-based steganography for Microsoft PowerPoint document[J].Inform.Technol.J,2008,7:654-660.
[44]YANG W C,CHEN L H.A steganographic method via various animations in PowerPoint files[J].Multimedia Tools and Applications,2015,74:1003-1019.
[45]YANG B,SUN X,XIANG L,et al.Steganography in MS Excel document using text-rotation technique[J].Information Technology Journal,2011,10(4):889-893.
[46]ALSAADI H I,AL-ANNIM K,ALMUTTAIRI R M,et al.Text steganography in font color of MS Excel sheet[C]//Proceedings of the First International Conference on Data Science,E-learning and Information Systems.2018:1-7.
[47]RYMAN D,IMBRIE P K,KASTNER J.Enhancement of plagia-rism detection techniques via watermarking[C]//2022 IEEE Frontiers in Education Conference(FIE).IEEE,2022:1-5.
[48]BITAR A W,DARAZI R,COUCHOT J F,et al.Blind digital watermarking in PDF documents using Spread Transform Dither Modulation[J].Multimedia Toolsand Applications,2017,76:143-161.
[49]KURIBAYASHI M,WONG K S.StealthPDF:Data hidingmethod for PDF file with no visual degradation[J].Journal of Information Security and Applications,2021,61:102875.
[50]FU Z,SUN X,LIU Y,et al.Text split-based steganography in OOXML format documents for covert communication[J].Secu-rity and Communication Networks,2012,5(9):957-968.
[51]PADDLEPADDLE AI STUDIO.Summary of financial datasets[EB/OL].(2022-01-24)[2023-01-16].https://aistudio.baidu.com/aistudio/projectdetail/3441337.
[1] LI Shasha, XING Hongjie. Robust Anomaly Detection Based on Adversarial Samples and AutoEncoder [J]. Computer Science, 2024, 51(5): 363-373.
[2] CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359.
[3] HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui. Screen-shooting Resilient DCT Domain Watermarking Method Based on Deep Learning [J]. Computer Science, 2024, 51(2): 343-351.
[4] YAO Hongliang, YIN Zhiyuan, YANG Jing, YU Kui. Stock Market Trend Reasoning Algorithm Based on Game Dynamic Influence Diagram [J]. Computer Science, 2023, 50(11A): 221100039-7.
[5] ZHAO Zitian, ZHAN Wenhan, DUAN Hancong, WU Yue. Study on Adversarial Robustness of Deep Learning Models Based on SVD [J]. Computer Science, 2023, 50(10): 362-368.
[6] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[7] YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501.
[8] ZHANG Cheng-rui, CHEN Jun-jie, GUO Hao. Comparative Analysis of Robustness of Resting Human Brain Functional Hypernetwork Model [J]. Computer Science, 2022, 49(2): 241-247.
[9] WANG Xiao-ming, WEN Xu-yun, XU Meng-ting, ZHANG Dao-qiang. Graph Convolutional Network Adversarial Attack Method for Brain Disease Diagnosis [J]. Computer Science, 2022, 49(12): 340-345.
[10] MU Jun-fang, ZHENG Wen-ping, WANG Jie, LIANG Ji-ye. Robustness Analysis of Complex Network Based on Rewiring Mechanism [J]. Computer Science, 2021, 48(7): 130-136.
[11] WANG Xue-guang, ZHANG Ai-xin, DOU Bing-lin. Non-linear Load Capacity Model of Complex Networks [J]. Computer Science, 2021, 48(6): 282-287.
[12] TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267.
[13] WU Qing-hong, GAO Xiao-dong. Face Recognition in Non-ideal Environment Based on Sparse Representation and Support Vector Machine [J]. Computer Science, 2020, 47(6): 121-125.
[14] LU Dong-dong, WU Jie, LIU Peng, SHENG Yong-xiang. Analysis of Key Developer Type and Robustness of Collaboration Network in Open Source Software [J]. Computer Science, 2020, 47(12): 100-105.
[15] CHEN Xiao-wen, LIU Guang-shuai, LIU Wang-hua, LI Xu-rui. Blurred Image Recognition Based on LoG Edge Detection and Enhanced Local Phase Quantization [J]. Computer Science, 2020, 47(12): 197-204.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!