{"title":"Review of the algorithms steganography in PDF documents and analysis","authors":"A. V. Sergeev, P. Khorev","doi":"10.1109/MWENT47943.2020.9067465","DOIUrl":null,"url":null,"abstract":"In this article, we will explore methods of using data hiding in a pdf document. The widespread use of PDF files can make its use for this purpose an interesting and practical solution. We was explore of algorithms of steganography algorithms from open sources and based on the analysis, an algorithm for detecting steganography proposed. We explore the methods to use a hide data in structure of the pdf document format, the basic strategies for hiding data, the statistical characteristics of PDF operators, we analysis the detection of changes after applying the algorithm for hiding data.","PeriodicalId":122716,"journal":{"name":"2020 Moscow Workshop on Electronic and Networking Technologies (MWENT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Moscow Workshop on Electronic and Networking Technologies (MWENT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWENT47943.2020.9067465","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this article, we will explore methods of using data hiding in a pdf document. The widespread use of PDF files can make its use for this purpose an interesting and practical solution. We was explore of algorithms of steganography algorithms from open sources and based on the analysis, an algorithm for detecting steganography proposed. We explore the methods to use a hide data in structure of the pdf document format, the basic strategies for hiding data, the statistical characteristics of PDF operators, we analysis the detection of changes after applying the algorithm for hiding data.