IEEE Security & Privacy

Download PDF

Keywords

Data Security, Hidden Data, Web Publishing

Abstract

In considering the leakage of information through hidden text mechanisms in commonly used information interchange formats, the author demonstrates how to automate and scale the search for hidden data in Microsoft Word documents. The combination of this scaling with typical behavior patterns of Word users and the default settings of the Word program leads to an uncomfortable state of affairs for Word users concerned about information security. The author discusses some countermeasures employable by users and notes more general consequences of these effects.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!