ABSTRACT
Data hiding provides a collection of techniques that can be used within a wider cybersecurity or privacy framework, making it possible, for example, to protect the users' privacy in streaming or broadcasting of multimedia contents or to detect cyberattacks in IoT networks when combined with machine learning solutions. However, criminals and terrorists are also aware and these techniques and can exploit them for malicious purposes. This contribution provides an overview of the traditional data hiding applications and the current trends in this field, pointing out prospective uses of data hiding in the context of information security and privacy, but also introducing potential threats for users and the society as a whole when they are applied for evil.
- K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, and S. Zander. 2018. The New Threats of Information Hiding: The Road Ahead. IT Professional 20, 3 (2018), 31--39. https://doi.org/10.1109/MITP.2018.032501746Google ScholarDigital Library
- I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. 2008. Digital Watermarking and Steganography (2nd ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.Google Scholar
- B. Halopeau. 2014. Chapter 10 - Terrorist use of the internet. In Cyber Crime and Cyber Terrorism Investigator's Handbook, B. Akhgar, A. Staniforth, and F. Bosco (Eds.). Syngress, 123--132. https://doi.org/10.1016/B978-0-12-800743-3.00010-4Google Scholar
- A. Iacovazzi and Y. Elovici. 2017. Network Flow Watermarking: A Survey. IEEE Communications Surveys Tutorials 19, 1 (2017), 512--530. https://doi.org/10.1109/COMST.2016.2604405Google ScholarDigital Library
- P. Korus. 2017. Digital image integrity --- a survey of protection and verification techniques. Digital Signal Processing 71 (2017), 1--26. https://doi.org/10.1016/j.dsp.2017.08.009Google ScholarCross Ref
- D. Lerch-Hostalot and D. Megías. 2016. Unsupervised steganalysis based on artificial training sets. Engineering Applications of Artificial Intelligence 50 (2016), 45--59. https://doi.org/10.1016/j.engappai.2015.12.013Google ScholarDigital Library
- J. Lubacz, W. Mazurczyk, and K. Szczypiorski. 2014. Principles and overview of network steganography. IEEE Communications Magazine 52, 5 (2014), 225--229. https://doi.org/10.1109/MCOM.2014.6815916Google ScholarCross Ref
- W. Mazurczyk. 2013. VoIP steganography and its detection---a survey. Comput. Surveys 46, 2 (2013). https://doi.org/10.1145/2543581.2543587Google ScholarDigital Library
- D. Megías and A. Qureshi. 2017. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications 71 (2017), 147--172. https://doi.org/10.1016/j.eswa.2016.11.015Google ScholarDigital Library
- D. Megías, M. Kuribayashi, and A. Qureshi. 2020. Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing. Computers 9, 2 (Apr 2020), 26 pages. https://doi.org/10.3390/computers9020026Google ScholarCross Ref
- S. Sultana, M. Shehab, and E. Bertino. 2013. Secure provenance transmission for streaming data. IEEE Transactions on Knowledge and Data Engineering 25, 8 (2013), 1890--1903. https://doi.org/10.1109/TKDE.2012.31Google ScholarDigital Library
- E. Zielińska, W. Mazurczyk, and K. Szczypiorski. 2014. Trends in Steganography. Commun. ACM 57, 3 (March 2014), 86--95. https://doi.org/10.1145/2566590.2566610Google ScholarDigital Library
Index Terms
- Data hiding: New opportunities for security and privacy?
Recommendations
High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism
We propose a reversible data hiding scheme using histogram modification technique.A new mechanism is proposed to select an optimum predictor from a set of predictors.A smaller prediction-error is obtained using our proposed mechanism.The prediction-...
Robust and secured image-adaptive data hiding
Rapid growth in the demand and consumption of digital information in past decade has led to valid concerns over issues such as content security, authenticity and digital right management. Imperceptible data hiding in digital images is an excellent ...
Reversible Data Hiding in the VQ-Compressed Domain
Steganographic methods usually produce distortions in cover images due to the process of embedding secret bits. These distortions are hard to remove, and thus the cover image cannot be recovered. Although the distortions are always small, they cannot be ...
Comments