Abstract
Portable Document Format, also named PDF, can integrate images, text, tables, or other elements into a single file, making it an easy-to-store and transfer document format. Due to the biggest feature of PDF being its portability, the modification of such files is very difficult and can ensure the security of the text to a certain extent. Therefore, it has been welcomed by a large number of researchers, office workers, and students. But as the demand for PDF files continues to rise, its security vulnerabilities are gradually being exposed. Consequently, a plethora of security measures for PDFs has come into view. This article primarily summarizes a portion of the overarching principles governing PDF security. Subsequently, this paper will focus on introducing the principles of steganography and cryptography in PDF security protocols while also selecting meaningful and representative research papers to summarize the advantages and disadvantages of the proposed methods.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.