skip to main content
10.1145/2971648.2971686acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

A data hiding approach for sensitive smartphone data

Published:12 September 2016Publication History

ABSTRACT

We develop and evaluate a data hiding method that enables smartphones to encrypt and embed sensitive information into carrier streams of sensor data. Our evaluation considers multiple handsets and a variety of data types, and we demonstrate that our method has a computational cost that allows real-time data hiding on smartphones with negligible distortion of the carrier stream. These characteristics make it suitable for smartphone applications involving privacy-sensitive data such as medical monitoring systems and digital forensics tools.

References

  1. Gregory D. Abowd. 2012. What next, ubicomp? Celebrating an intellectual disappearing act. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, 31--40. http://dx.doi.org/10.1145/2370216.2370222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Corey M. Angst and Ritu Agarwal. 2009. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. MIS Q. 33, 2: 339--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Davide Anguita, Alessandro Ghio, Luca Oneto, Xavier Parra and Jorge J. L. Reyes-Ortiz. 2013. A public domain dataset for human activity recognition using smartphones. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN.Google ScholarGoogle Scholar
  4. David Blumenthal and Marilyn Tavenner. 2010. The meaningful use regulation for electronic health records. New England Journal of Medicine 363, 6: 501--504.Google ScholarGoogle ScholarCross RefCross Ref
  5. Sebastian Boring, Marko Jurmu and Andreas Butz. 2009. Scroll, Tilt or Move It: Using Mobile Phones to Continuously Control Pointers on Large Public Displays. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, ACM, 161--168. http://dx.doi.org/10.1145/1738826.1738853. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yohan Chon, Nicholas D. Lane, Yunjong Kim, Feng Zhao and Hojung Cha. 2013. Understanding the Coverage and Scalability of Place-centric Crowdsensing. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, 3--12. http://dx.doi.org/10.1145/2493432.2493498. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G Coatrieux, L Lecornu, B Sankur and Ch Roux. 2006. A Review of Image Watermarking Applications in Healthcare. In Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, IEEE, 4691--4694. http://dx.doi.org/10.1109/IEMBS.2006.259305.Google ScholarGoogle ScholarCross RefCross Ref
  8. Christian Collberg and Jasvir Nagra. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. John P. Collomosse and Tim Kindberg. 2008. Screen Codes: Visual Hyperlinks for Displays. In Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, ACM, 86--90. http://dx.doi.org/10.1145/1411759.1411782. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ionut Constandache, Xuan Bao, Martin Azizyan and Romit R. R. Choudhury. 2010. Did You See Bob?: Human Localization Using Mobile Phones. In Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, ACM, 149--160. http://dx.doi.org/10.1145/1859995.1860013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ingemar J. Cox, Joe Kilian, Tom Leighton and Talal Shamoon. 1996. A secure, robust watermark for multimedia. In Information Hiding (eds.). Springer Berlin Heidelberg, 185--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich and Ton Kalker. 2008. Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc.. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Stefan Dernbach, Barnan Das, Narayanan C. Krishnan, Brian L. Thomas and Diane J. Cook. 2012. Simple and Complex Activity Recognition through Smart Phones. In International Conference on Intelligent Environments, IEEE, 214--221. http://dx.doi.org/10.1109/IE.2012.39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Morris J. Dworkin. 2007. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC.Google ScholarGoogle Scholar
  15. Frank Hartung and Martin Kutter. 1999. Multimedia watermarking techniques. Proceedings of the IEEE 87, 7: 1079--1107. http://dx.doi.org/10.1109/5.771066.Google ScholarGoogle ScholarCross RefCross Ref
  16. Richard Heeks. 2006. Health information systems: Failure, success and improvisation. International Journal of Medical Informatics 75, 2: 125--137. http://dx.doi.org/10.1016/j.ijmedinf.2005.07.024.Google ScholarGoogle ScholarCross RefCross Ref
  17. 2008. IEEE Standard for Floating-Point Arithmetic. IEEE Std 754-2008: 1--70. http://dx.doi.org/10.1109/IEEESTD.2008.4610935.Google ScholarGoogle Scholar
  18. Hussam Juma, Ibrahim Kamel and Lami Kaya. 2008. Watermarking sensor data for protecting the integrity. In International Conference on Innovations in Information Technology, IEEE, 598--602. http://dx.doi.org/10.1109/INNOVATIONS.2008.4781662.Google ScholarGoogle ScholarCross RefCross Ref
  19. Apu Kapadia, David Kotz and Nikos Triandopoulos. 2009. Opportunistic sensing: Security challenges for the new paradigm. In Communication Systems and Networks and Workshops, IEEE, 1--10. http://dx.doi.org/10.1109/COMSNETS.2009.4808850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith and Jeffrey Hightower. 2009. Exploring Privacy Concerns About Personal Sensing. In Proceedings of the 7th International Conference on Pervasive Computing, Springer-Verlag, 176--183. http://dx.doi.org/10.1007/978-3-642-01516-8_13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Vassilis Kostakos and Denzil Ferreira. 2015. The Rise Of Ubiquitous Instrumentation. Frontiers in ICT 2, 3: 1--2. http://dx.doi.org/10.3389/fict.2015.00003.Google ScholarGoogle ScholarCross RefCross Ref
  22. Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury and Andrew T. Campbell. 2010. A Survey of Mobile Phone Sensing. Communications Magazine, IEEE 48, 9: 140--150. http://dx.doi.org/10.1109/MCOM.2010.5560598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Reed Larson and Mihaly Csikszentmihalyi. 2014. The Experience Sampling Method. Springer Netherlands.Google ScholarGoogle Scholar
  24. Teemu Leppänen, José A. Lacasia, Yoshito Tobe, Kaoru Sezaki and Jukka Riekki. 2015. Mobile crowdsensing with mobile agents. Autonomous Agents and Multi-Agent Systems: 1--35. http://dx.doi.org/10.1007/s10458-015-9311-7.Google ScholarGoogle Scholar
  25. LIS3DH MEMS digital output motion sensor ultra low-power high performance 3-axes "nano" accelerometer. http://www.st.com/web/en/resource/technical/document/datasheet/CD00274221.pdf.Google ScholarGoogle Scholar
  26. Cristina V. Lopes and Pedro M. Q. Aguiar. 2003. Acoustic Modems for Ubiquitous Computing. IEEE Pervasive Computing 2, 3: 62--71. http://dx.doi.org/10.1109/MPRV.2003.1228528. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Nai Miao, Yutao He and Jane Dong. 2012. hymnMark: Towards Efficient Digital Watermarking on Android Smartphones. In Proceedings of the International Conference on Wireless Networks (ICWN), 1--8.Google ScholarGoogle Scholar
  28. Alexios Mylonas, Vasilis Meletiadis, Lilian Mitrou and Dimitris Gritzalis. 2013. Smartphone sensor data as digital evidence. Computers & Security 38: 51--75. http://dx.doi.org/10.1016/j.cose.2013.03.007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. W. Pan, G. Coatrieux, J. Montagner, N. Cuppens, F. Cuppens and C. Roux. 2009. Comparison of some reversible watermarking methods in application to medical images. In Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, IEEE, 2172--2175. http://dx.doi.org/10.1109/IEMBS.2009.5332425.Google ScholarGoogle Scholar
  30. Jennifer Pearson, Simon Robinson, Matt Jones, Amit Nanavati and Nitendra Rajput. 2013. ACQR: Acoustic Quick Response Codes for Content Sharing on Low End Phones with No Internet Connectivity. In Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services, ACM, 308--317. http://dx.doi.org/10.1145/2493190.2493195. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Yanzhi Ren, Yingying Chen, Mooi C. Chuah and Jie Yang. 2015. User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems. Mobile Computing, IEEE Transactions on 14, 9: 1961--1974. http://dx.doi.org/10.1109/TMC.2014.2365185.Google ScholarGoogle Scholar
  32. Amit Sahai. 2004. Secure Protocols for Complex Tasks in Complex Environments. In Progress in Cryptology - INDOCRYPT 2004, Springer Berlin Heidelberg, 14--16. http://dx.doi.org/10.1007/978-3-540-30556-9_2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Frank Y. Shih. 2007. Digital Watermarking and Steganography Fundamentals and Techniques. CRC Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Boris Smus and Vassilis Kostakos. 2010. Running gestures: hands-free interaction during physical activity. In International Conference on Ubiquitous Computing Adjunct, ACM, 433--434. http://dx.doi.org/10.1145/1864431.1864473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Ryohei Suzuki, Daisuke Sakamoto and Takeo Igarashi. 2015. AnnoTone: Record-time Audio Watermarking for Context-aware Video Editing. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 57--66. http://dx.doi.org/10.1145/2702123.2702358. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Astrid M. van Ginneken. 2002. The computerized patient record: balancing effort and benefit. International Journal of Medical Informatics 65, 2: 97--119. http://dx.doi.org/10.1016/s1386-5056(02)00007-2.Google ScholarGoogle ScholarCross RefCross Ref
  37. R. Velumani and V. Seenivasagam. 2010. A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In IEEE International Conference on Computational Intelligence and Computing Research, IEEE, 1--8. http://dx.doi.org/10.1109/ICCIC.2010.5705832.Google ScholarGoogle ScholarCross RefCross Ref
  38. Honggang Wang, Dongming Peng, Wei Wang, Hamid Sharif and Hsiao-Hwa Chen. 2008. Energy-Aware Adaptive Watermarking for Real-Time Image Delivery in Wireless Sensor Networks. In International Conference on Communications, IEEE, 1479--1483. http://dx.doi.org/10.1109/ICC.2008.286.Google ScholarGoogle Scholar
  39. Wei Zhang, Yonghe Liu, Sajal K. Das and Pradip De. 2008. Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive and Mobile Computing 4, 5: 658--680. http://dx.doi.org/10.1016/j.pmcj.2008.05.005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wu Zhou, Xinwen Zhang and Xuxian Jiang. 2013. AppInk: Watermarking Android Apps for Repackaging Deterrence. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ACM, 1--12. http://dx.doi.org/10.1145/2484313.2484315. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A data hiding approach for sensitive smartphone data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing
      September 2016
      1288 pages
      ISBN:9781450344616
      DOI:10.1145/2971648

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 September 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      UbiComp '16 Paper Acceptance Rate101of389submissions,26%Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader