Byers research article on hidden metadeta in Word documents

Byers 2003 Scalable Exploitation of, and Responses to Information Leakage Through Hidden Data in Published Documents

Abstract
In considering the leakage of information through hidden text mechanisms in commonly
used information interchange formats we demonstrate how to automate and scale the search for
hidden data inWord documents. The combination of this scaling with typical behaviour patterns
of Word users and the default settings of the Word program leads to an uncomfortable state of
affairs for Word users concerned about information security. We discuss some countermeasures
employable by users and note more general consequences of these effects.