Abstract
With the prevalence of smartphones, message exchanges via mobile chatting programs like LINE have become popular. The messages in the form of chat records in a LINE chat history, after being downloaded for legal uses, might be tampered with illicitly. A novel method for authenticating the chat history against such attacks is proposed. The signal used for authenticating each chat-record segment is created by concatenating the ID label of the segment and a digest yielded by hashing the segment content. The signal is then encoded by three types of spacing code, namely half space, full space, and tab, and embedded into the blank-space areas created by the tab codes in the chat records of the segment. Authentication of a history file is accomplished by extracting the authentication signals embedded in the file and comparing them with the original signals computed directly from the file. The embedded signals are invisible, arousing no suspicion from the hacker. The signals are fragile, because any modification of the records can be detected by the authentication process. Experiments for testing four types of tampering with text files of four languages have been conducted, yielding correct authentication results that show the feasibility of the proposed method.
- [1] . 2019. LINE: Free Calls & Messages. Retrieved October 10, 2019 from https://line.me/en/.Google Scholar
- [2] . 2021. Facebook Messenger. Retrieved March 25, 2021 from https://en.wikipedia.org/wiki/Facebook_Messenger.Google Scholar
- [3] . 2021. Instagram. Retrieved March 28, 2021 from https://en.wikipedia.org/wiki/Instagram.Google Scholar
- [4] . 2019. Responding to Law Enforcement Agencies, Retrieved April 15, 2021 from https://linecorp.com/en/security/article/35.Google Scholar
- [5] . 2001. Digital steganography: Hiding data within data. IEEE Internet Computing 5, 3 (2001), 75–80.
DOI: http://doi.org/10.1109/4236.935180 Google ScholarDigital Library - [6] . 1999. Document image data hiding technique using character spacing width sequence coding. In Proceedings of the International Conference on Image Processing. 250–254.
DOI: DOI: https://doi.org/10.1109/ICIP.1999.822894Google ScholarCross Ref - [7] 2008. Data hiding in emails and applications using unused ASCII control codes. Journal of Information Technology and Applications 3, 1 (2008), 13–24.Google Scholar
- [8] . 2017. Data hiding on web using combination of steganography and cryptography. In Proceedings of the International Conference on Computer, Communications, and Electronics. 448–452.
DOI: DOI: https://doi.org/10.1109/COMPTELIX.2017.8004011Google ScholarCross Ref - [9] . 1996. Techniques for data hiding. IBM System Journal 35, 3.4 (1996), 313–336.
DOI: DOI: https://doi.org/10.1147/sj.353.0313 Google ScholarCross Ref - [10] . 2019. Lexical Steganography Through Adaptive Modulation of the Word Choice Hash. Retrieved July 15, 2019 from http://web.mit.edu/keithw/tlex/.Google Scholar
- [11] . 2014. A new approach to SMS text steganography using emoticons. In Proceedings of the National Conference on the Role of Engineers in Nation Building. 103–105.Google Scholar
- [12] . 2007. A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security 2, 1 (2007), 24–30.
DOI: DOI: https://doi.org/10.1109/TIFS.2006.890310 Google ScholarCross Ref - [13] . 2009. Enhanced text steganography in SMS. In Proceedings of the 2nd IEEE International Conference on Computer, Control, and Communication. 1–6.
DOI: DOI: https://doi.org/10.1109/IC4.2009.4909228Google ScholarCross Ref - [14] . 2011. Steganography via running short text messages. Multimedia Tools and Applications 52 (2011), 569–596.
DOI: DOI: https://doi.org/10.1007/s11042-009-0432-3 Google ScholarCross Ref - [15] . 2007. Text steganography in chat. In Proceedings of the 3rd IEEE/IFIP International Conference in Central Asia on Internet. 1–5.
DOI: DOI: https://doi.org/10.1109/CANET.2007.4401716 Google ScholarCross Ref - [16] . 2019. Authentication of LINE chat records by information hiding techniques. In Proceedings of the 2019 Cryptology and Information Security Conference.Google Scholar
- [17] . 2021. HTML. Retrieved April 5, 2021 from https://en.wikipedia.org/wiki/HTML.Google Scholar
- [18] 2021. Introducing JSON. Retrieved April 10, 2021 from https://www.json.org.Google Scholar
- [19] . 2014. Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 3 (2014), 405–414.
DOI: DOI: https://doi.org/10.1016/S0164-1212(03)00239-5 Google ScholarCross Ref - [20] . 2019. Search for Character(s) in Unicode 13.0.0. Retrieved November 8, 2021 from https://unicode-search.net/.Google Scholar
- [21] 2019. Unicode: World Standard for Text and Emoji. Retrieved September 16, 2019 from https://home.unicode.org/.Google Scholar
- [22] . 2017. Non-full Sbox linearization: Applications to collision attacks on round-reduced Keccak. In Proceedings of the Annual International Cryptology Conference. 428–451.Google ScholarCross Ref
- [23] . 2019. SHA3.Shake256 Method. Retrieved September 30, 2019 from http://mathmesh.com/Code/mmm/html/86c2bae1-9518-e8ae-e1f5-5a7712812f1b.htm.Google Scholar
- [24] 2019. SHA-3 Project - Hash Functions | CSRC. Retrieved September 22, 2019 from https://csrc.nist.gov/projects/hash-functions/sha-3-project.Google Scholar
- [25] . 1998. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16, 4 (1998), 573–586.
DOI: DOI: https://doi.org/10.1109/49.668979 Google ScholarCross Ref - [26] . 2020. Secure neural network watermarking protocol against forging attack. EURASIP Journal on Image and Video Processing 2020, 37 (2020), 1–12.
DOI: DOI: https://doi.org/10.1186/s13640-020-00527-1Google Scholar - [27] . 1999. A review of watermarking principles and practices. In Digital Signal Processing in Multimedia Systems, (Eds.). CRC Press, Boca Raton, FL, 461–485.
DOI: DOI: https://doi.org/10.1201/9781482276046Google Scholar
Index Terms
- Authentication of LINE Chat History Files by Information Hiding
Recommendations
High capacity information hiding for privacy protection in digital video files
In this paper, a framework to hide privacy in video is proposed based on data hiding principals. A novel data hiding technique is proposed and implemented to hide the original frame into the in-painted one. The proposed hiding technique is carried out ...
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Information hiding is a technique that embeds secret data in digital media for using in a variety of applications, including ownership protection, authentication, access control, annotation and so on. In this paper, we propose an information hiding ...
A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments
The growth of image processing tools and applications has made it easy for multi-media content such as music, audio, and video to be manipulated or forged during transmission over the Internet. Efforts, such as information hiding in steganography, have ...
Comments