Li, Shujun, Ho, Anthony T.S., Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. CCS Computer and Communications Security . pp. 27-37. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008)
This is the latest version of this item.
PDF
Author's Accepted Manuscript
Language: English
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
|
|
Download this file (PDF/1MB) |
Preview |
Request a format suitable for use with assistive technology e.g. a screenreader | |
Official URL: https://dx.doi.org/10.1145/3267357.3267365 |
Abstract
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online social networks) in a selected digital world. Different from other traditional schemes, where the hidden information is embedded into one or more selected or generated cover objects, in the new framework the hidden information is embedded in the fact that some particular digital activities with some particular attributes took place in some particular ways in the receiver-observable digital world.
In the new framework the concept of "cover" almost disappears, or one can say that now the whole digital world selected becomes the cover. The new framework can find applications in both security (e.g., steganography) and non-security domains (e.g., gaming). For security applications we expect that the new framework calls for completely new steganalysis techniques, which are likely more complicated, less effective and less efficient than existing ones due to the need to monitor and analyze the whole digital world constantly and in real time. A proof-of-concept system was developed as a mobile app based on Twitter activities to demonstrate the information hiding framework works. We are developing a more hybrid system involving several online social networks.
Item Type: | Conference or workshop item (Paper) |
---|---|
DOI/Identification number: | 10.1145/3267357.3267365 |
Additional information: | This paper was published by ACM under an exclusive license. The copyrights are reserved by the co-authors. |
Uncontrolled keywords: | Information hiding; framework; entities; activities; behavior; steganography; steganalysis; security; capacity; usability; cover; digital world; Internet; Web; computer networks; online social networks; OSN; social media; Twitter; encoding; decoding; embedding; game-based; information hiding; network steganography; coverless information hiding; generative information hiding; batch steganography; pooled steganalysis; command & control; C&C; conflict avoidance; naturalness checking; mobile computing; Android |
Subjects: | Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science |
Divisions: |
Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing University-wide institutes > Institute of Cyber Security for Society |
Depositing User: | Shujun Li |
Date Deposited: | 08 Sep 2018 22:03 UTC |
Last Modified: | 05 Nov 2024 12:30 UTC |
Resource URI: | https://kar.kent.ac.uk/id/eprint/69008 (The current URI for this page, for reference purposes) |
Available versions of this item
-
Lost in the Digital Wild: Hiding Information in Digital Activities. (deposited 08 Sep 2018 22:02)
- Lost in the Digital Wild: Hiding Information in Digital Activities. (deposited 08 Sep 2018 22:03) [Currently Displayed]
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):