Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(65.01KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Non-Specialized File Format Extension
Blake W. Ford, Khosrow Kaikhah
Pages - 425 - 432     |    Revised - 01-11-2011     |    Published - 15-12-2011
Volume - 5   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
MORE INFORMATION
KEYWORDS
steganography, CAD, metadata
ABSTRACT
The study expands upon previous work in format extension. The initial research purposed extra space provided by an unrefined format to store metadata about the file in question. This process does not negatively impact the original intent of the format and allows for the creation of new derivative file types with both backwards compatibility and new features. The file format extension algorithm has been rewritten entirely in C++ and is now being distributed as an open source C/C++ static library, roughdraftlib. The files from our previous research are essentially binary compatible though a few extra fields have been added for developer convenience. The new data represents the current and oldest compatible versions of the binary and values representing the scaling ratio of the image. These new fields are statically included in every file and take only a few bytes to encode, so they have a trivial effect on the overall encoding density.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 Bielefeld Academic Search Engine (BASE) 
6 Scribd 
7 SlideShare 
8 PdfSR 
1 B. W. Ford and K, Kaikhah. “File Format Extension Through Steganography,” presented at the International Conference on Software Engineering, Management & Application, Kathmandu, Nepal, 2010.
2 B. W. Ford and K, Kaikhah. “Honing File Format Extension Through Steganography,” presented at the International Conference on Infocomm Technologies in Competitive Strategies, Singapore, 2010.
3 G. Cantrell and D. D. Dampier. “Experiments in hiding data inside the file structure of common office documents: a steganography application.” In Proceedings of the International Symposium on information and Communication Technologies, 2004, pp. 146- 151.
4 G.A. Francia and T. S. Gomez. “Steganography obliterator: an attack on the least significant bits.” In Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006, pp. 85-91.
5 J. Fridrich. “Minimizing the embedding impact in steganography.” In Proceedings of the 8th Workshop on Multimedia and Security, 2006, pp. 2-10.
6 J. Fridrich, T. Pevný, and J. Kodovský. “Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.” In Proceedings of the 9th Workshop on Multimedia and Security, 2007, pp. 3-14.
7 C. M.C. Chen, S. S. Agaian, and C. L. P. Chen. “Generalized collage steganography on images." In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2008, pp. 1043-1047.
8 Z. Oplatkova, J. Holoska, I. Zelinka, and R. Senkerik. “Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks.” In Proceedings of the Third Asia International Conference on Modeling and Simulation, 2009, pp. 25-29.
Mr. Blake W. Ford
- United States of America
Dr. Khosrow Kaikhah
Texas State University - United States of America
kk02@txstate.edu