An Effective Method for Hidding Data in Microsoft Word Documents

Article ID

CSTNWS37RWN

An Effective Method for Hidding Data in Microsoft Word Documents

Dr. Jassam .T. Sarsoh
Dr. Jassam .T. Sarsoh
Kadhem. M. Hashem
Kadhem. M. Hashem
Hayder I. Hendi
Hayder I. Hendi University of Thi Qar
DOI

Abstract

Most of Microsoft word documents were transfer or shared via internet by using e-mail or any electronic way. This facility is exploited to send any embedded secret data anywhere. In This paper an efficient method was proposed to hide any text massage with in Microsoft word documents.The initial idea of this method is to exploit the addition three spaces on end of paragraph using for hidden data into it by using the color storage bytes. Two algorithm are proposed and implemented by using PHP language , the first one is to hide the secret message in original text ,and the second is retrieve the original text after the determination of hidden data in it . The comparison of the obtained results between the original text and the text contains the hidden data shows that the two texts are virtually identical.

An Effective Method for Hidding Data in Microsoft Word Documents

Most of Microsoft word documents were transfer or shared via internet by using e-mail or any electronic way. This facility is exploited to send any embedded secret data anywhere. In This paper an efficient method was proposed to hide any text massage with in Microsoft word documents.The initial idea of this method is to exploit the addition three spaces on end of paragraph using for hidden data into it by using the color storage bytes. Two algorithm are proposed and implemented by using PHP language , the first one is to hide the secret message in original text ,and the second is retrieve the original text after the determination of hidden data in it . The comparison of the obtained results between the original text and the text contains the hidden data shows that the two texts are virtually identical.

Dr. Jassam .T. Sarsoh
Dr. Jassam .T. Sarsoh
Kadhem. M. Hashem
Kadhem. M. Hashem
Hayder I. Hendi
Hayder I. Hendi University of Thi Qar

No Figures found in article.

Hayder I. Hendi. 2012. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E12): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 12 Issue E12
Pg. 39- 42
Classification
Not Found
Article Matrices
Total Views: 10179
Total Downloads: 2667
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

An Effective Method for Hidding Data in Microsoft Word Documents

Dr. Jassam .T. Sarsoh
Dr. Jassam .T. Sarsoh
Kadhem. M. Hashem
Kadhem. M. Hashem
Hayder I. Hendi
Hayder I. Hendi University of Thi Qar

Research Journals