Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3424954.3425511acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
invited-talk

Data hiding: New opportunities for security and privacy?

Authors Info & Claims
Published:12 January 2021Publication History

ABSTRACT

Data hiding provides a collection of techniques that can be used within a wider cybersecurity or privacy framework, making it possible, for example, to protect the users' privacy in streaming or broadcasting of multimedia contents or to detect cyberattacks in IoT networks when combined with machine learning solutions. However, criminals and terrorists are also aware and these techniques and can exploit them for malicious purposes. This contribution provides an overview of the traditional data hiding applications and the current trends in this field, pointing out prospective uses of data hiding in the context of information security and privacy, but also introducing potential threats for users and the society as a whole when they are applied for evil.

References

  1. K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, and S. Zander. 2018. The New Threats of Information Hiding: The Road Ahead. IT Professional 20, 3 (2018), 31--39. https://doi.org/10.1109/MITP.2018.032501746Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. 2008. Digital Watermarking and Steganography (2nd ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.Google ScholarGoogle Scholar
  3. B. Halopeau. 2014. Chapter 10 - Terrorist use of the internet. In Cyber Crime and Cyber Terrorism Investigator's Handbook, B. Akhgar, A. Staniforth, and F. Bosco (Eds.). Syngress, 123--132. https://doi.org/10.1016/B978-0-12-800743-3.00010-4Google ScholarGoogle Scholar
  4. A. Iacovazzi and Y. Elovici. 2017. Network Flow Watermarking: A Survey. IEEE Communications Surveys Tutorials 19, 1 (2017), 512--530. https://doi.org/10.1109/COMST.2016.2604405Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Korus. 2017. Digital image integrity --- a survey of protection and verification techniques. Digital Signal Processing 71 (2017), 1--26. https://doi.org/10.1016/j.dsp.2017.08.009Google ScholarGoogle ScholarCross RefCross Ref
  6. D. Lerch-Hostalot and D. Megías. 2016. Unsupervised steganalysis based on artificial training sets. Engineering Applications of Artificial Intelligence 50 (2016), 45--59. https://doi.org/10.1016/j.engappai.2015.12.013Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Lubacz, W. Mazurczyk, and K. Szczypiorski. 2014. Principles and overview of network steganography. IEEE Communications Magazine 52, 5 (2014), 225--229. https://doi.org/10.1109/MCOM.2014.6815916Google ScholarGoogle ScholarCross RefCross Ref
  8. W. Mazurczyk. 2013. VoIP steganography and its detection---a survey. Comput. Surveys 46, 2 (2013). https://doi.org/10.1145/2543581.2543587Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Megías and A. Qureshi. 2017. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications 71 (2017), 147--172. https://doi.org/10.1016/j.eswa.2016.11.015Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Megías, M. Kuribayashi, and A. Qureshi. 2020. Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing. Computers 9, 2 (Apr 2020), 26 pages. https://doi.org/10.3390/computers9020026Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Sultana, M. Shehab, and E. Bertino. 2013. Secure provenance transmission for streaming data. IEEE Transactions on Knowledge and Data Engineering 25, 8 (2013), 1890--1903. https://doi.org/10.1109/TKDE.2012.31Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Zielińska, W. Mazurczyk, and K. Szczypiorski. 2014. Trends in Steganography. Commun. ACM 57, 3 (March 2014), 86--95. https://doi.org/10.1145/2566590.2566610Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Data hiding: New opportunities for security and privacy?

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
          November 2020
          72 pages
          ISBN:9781450375993
          DOI:10.1145/3424954

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 January 2021

          Check for updates

          Qualifiers

          • invited-talk
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader