ABSTRACT
We develop and evaluate a data hiding method that enables smartphones to encrypt and embed sensitive information into carrier streams of sensor data. Our evaluation considers multiple handsets and a variety of data types, and we demonstrate that our method has a computational cost that allows real-time data hiding on smartphones with negligible distortion of the carrier stream. These characteristics make it suitable for smartphone applications involving privacy-sensitive data such as medical monitoring systems and digital forensics tools.
- Gregory D. Abowd. 2012. What next, ubicomp? Celebrating an intellectual disappearing act. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, 31--40. http://dx.doi.org/10.1145/2370216.2370222. Google ScholarDigital Library
- Corey M. Angst and Ritu Agarwal. 2009. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. MIS Q. 33, 2: 339--370. Google ScholarDigital Library
- Davide Anguita, Alessandro Ghio, Luca Oneto, Xavier Parra and Jorge J. L. Reyes-Ortiz. 2013. A public domain dataset for human activity recognition using smartphones. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN.Google Scholar
- David Blumenthal and Marilyn Tavenner. 2010. The meaningful use regulation for electronic health records. New England Journal of Medicine 363, 6: 501--504.Google ScholarCross Ref
- Sebastian Boring, Marko Jurmu and Andreas Butz. 2009. Scroll, Tilt or Move It: Using Mobile Phones to Continuously Control Pointers on Large Public Displays. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, ACM, 161--168. http://dx.doi.org/10.1145/1738826.1738853. Google ScholarDigital Library
- Yohan Chon, Nicholas D. Lane, Yunjong Kim, Feng Zhao and Hojung Cha. 2013. Understanding the Coverage and Scalability of Place-centric Crowdsensing. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, 3--12. http://dx.doi.org/10.1145/2493432.2493498. Google ScholarDigital Library
- G Coatrieux, L Lecornu, B Sankur and Ch Roux. 2006. A Review of Image Watermarking Applications in Healthcare. In Engineering in Medicine and Biology Society, 2006. EMBS '06. 28th Annual International Conference of the IEEE, IEEE, 4691--4694. http://dx.doi.org/10.1109/IEMBS.2006.259305.Google ScholarCross Ref
- Christian Collberg and Jasvir Nagra. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional. Google ScholarDigital Library
- John P. Collomosse and Tim Kindberg. 2008. Screen Codes: Visual Hyperlinks for Displays. In Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, ACM, 86--90. http://dx.doi.org/10.1145/1411759.1411782. Google ScholarDigital Library
- Ionut Constandache, Xuan Bao, Martin Azizyan and Romit R. R. Choudhury. 2010. Did You See Bob?: Human Localization Using Mobile Phones. In Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, ACM, 149--160. http://dx.doi.org/10.1145/1859995.1860013. Google ScholarDigital Library
- Ingemar J. Cox, Joe Kilian, Tom Leighton and Talal Shamoon. 1996. A secure, robust watermark for multimedia. In Information Hiding (eds.). Springer Berlin Heidelberg, 185--206. Google ScholarDigital Library
- Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich and Ton Kalker. 2008. Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc.. Google ScholarDigital Library
- Stefan Dernbach, Barnan Das, Narayanan C. Krishnan, Brian L. Thomas and Diane J. Cook. 2012. Simple and Complex Activity Recognition through Smart Phones. In International Conference on Intelligent Environments, IEEE, 214--221. http://dx.doi.org/10.1109/IE.2012.39. Google ScholarDigital Library
- Morris J. Dworkin. 2007. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC.Google Scholar
- Frank Hartung and Martin Kutter. 1999. Multimedia watermarking techniques. Proceedings of the IEEE 87, 7: 1079--1107. http://dx.doi.org/10.1109/5.771066.Google ScholarCross Ref
- Richard Heeks. 2006. Health information systems: Failure, success and improvisation. International Journal of Medical Informatics 75, 2: 125--137. http://dx.doi.org/10.1016/j.ijmedinf.2005.07.024.Google ScholarCross Ref
- 2008. IEEE Standard for Floating-Point Arithmetic. IEEE Std 754-2008: 1--70. http://dx.doi.org/10.1109/IEEESTD.2008.4610935.Google Scholar
- Hussam Juma, Ibrahim Kamel and Lami Kaya. 2008. Watermarking sensor data for protecting the integrity. In International Conference on Innovations in Information Technology, IEEE, 598--602. http://dx.doi.org/10.1109/INNOVATIONS.2008.4781662.Google ScholarCross Ref
- Apu Kapadia, David Kotz and Nikos Triandopoulos. 2009. Opportunistic sensing: Security challenges for the new paradigm. In Communication Systems and Networks and Workshops, IEEE, 1--10. http://dx.doi.org/10.1109/COMSNETS.2009.4808850. Google ScholarDigital Library
- Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith and Jeffrey Hightower. 2009. Exploring Privacy Concerns About Personal Sensing. In Proceedings of the 7th International Conference on Pervasive Computing, Springer-Verlag, 176--183. http://dx.doi.org/10.1007/978-3-642-01516-8_13. Google ScholarDigital Library
- Vassilis Kostakos and Denzil Ferreira. 2015. The Rise Of Ubiquitous Instrumentation. Frontiers in ICT 2, 3: 1--2. http://dx.doi.org/10.3389/fict.2015.00003.Google ScholarCross Ref
- Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury and Andrew T. Campbell. 2010. A Survey of Mobile Phone Sensing. Communications Magazine, IEEE 48, 9: 140--150. http://dx.doi.org/10.1109/MCOM.2010.5560598. Google ScholarDigital Library
- Reed Larson and Mihaly Csikszentmihalyi. 2014. The Experience Sampling Method. Springer Netherlands.Google Scholar
- Teemu Leppänen, José A. Lacasia, Yoshito Tobe, Kaoru Sezaki and Jukka Riekki. 2015. Mobile crowdsensing with mobile agents. Autonomous Agents and Multi-Agent Systems: 1--35. http://dx.doi.org/10.1007/s10458-015-9311-7.Google Scholar
- LIS3DH MEMS digital output motion sensor ultra low-power high performance 3-axes "nano" accelerometer. http://www.st.com/web/en/resource/technical/document/datasheet/CD00274221.pdf.Google Scholar
- Cristina V. Lopes and Pedro M. Q. Aguiar. 2003. Acoustic Modems for Ubiquitous Computing. IEEE Pervasive Computing 2, 3: 62--71. http://dx.doi.org/10.1109/MPRV.2003.1228528. Google ScholarDigital Library
- Nai Miao, Yutao He and Jane Dong. 2012. hymnMark: Towards Efficient Digital Watermarking on Android Smartphones. In Proceedings of the International Conference on Wireless Networks (ICWN), 1--8.Google Scholar
- Alexios Mylonas, Vasilis Meletiadis, Lilian Mitrou and Dimitris Gritzalis. 2013. Smartphone sensor data as digital evidence. Computers & Security 38: 51--75. http://dx.doi.org/10.1016/j.cose.2013.03.007. Google ScholarDigital Library
- W. Pan, G. Coatrieux, J. Montagner, N. Cuppens, F. Cuppens and C. Roux. 2009. Comparison of some reversible watermarking methods in application to medical images. In Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, IEEE, 2172--2175. http://dx.doi.org/10.1109/IEMBS.2009.5332425.Google Scholar
- Jennifer Pearson, Simon Robinson, Matt Jones, Amit Nanavati and Nitendra Rajput. 2013. ACQR: Acoustic Quick Response Codes for Content Sharing on Low End Phones with No Internet Connectivity. In Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services, ACM, 308--317. http://dx.doi.org/10.1145/2493190.2493195. Google ScholarDigital Library
- Yanzhi Ren, Yingying Chen, Mooi C. Chuah and Jie Yang. 2015. User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems. Mobile Computing, IEEE Transactions on 14, 9: 1961--1974. http://dx.doi.org/10.1109/TMC.2014.2365185.Google Scholar
- Amit Sahai. 2004. Secure Protocols for Complex Tasks in Complex Environments. In Progress in Cryptology - INDOCRYPT 2004, Springer Berlin Heidelberg, 14--16. http://dx.doi.org/10.1007/978-3-540-30556-9_2. Google ScholarDigital Library
- Frank Y. Shih. 2007. Digital Watermarking and Steganography Fundamentals and Techniques. CRC Press. Google ScholarDigital Library
- Boris Smus and Vassilis Kostakos. 2010. Running gestures: hands-free interaction during physical activity. In International Conference on Ubiquitous Computing Adjunct, ACM, 433--434. http://dx.doi.org/10.1145/1864431.1864473. Google ScholarDigital Library
- Ryohei Suzuki, Daisuke Sakamoto and Takeo Igarashi. 2015. AnnoTone: Record-time Audio Watermarking for Context-aware Video Editing. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 57--66. http://dx.doi.org/10.1145/2702123.2702358. Google ScholarDigital Library
- Astrid M. van Ginneken. 2002. The computerized patient record: balancing effort and benefit. International Journal of Medical Informatics 65, 2: 97--119. http://dx.doi.org/10.1016/s1386-5056(02)00007-2.Google ScholarCross Ref
- R. Velumani and V. Seenivasagam. 2010. A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In IEEE International Conference on Computational Intelligence and Computing Research, IEEE, 1--8. http://dx.doi.org/10.1109/ICCIC.2010.5705832.Google ScholarCross Ref
- Honggang Wang, Dongming Peng, Wei Wang, Hamid Sharif and Hsiao-Hwa Chen. 2008. Energy-Aware Adaptive Watermarking for Real-Time Image Delivery in Wireless Sensor Networks. In International Conference on Communications, IEEE, 1479--1483. http://dx.doi.org/10.1109/ICC.2008.286.Google Scholar
- Wei Zhang, Yonghe Liu, Sajal K. Das and Pradip De. 2008. Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive and Mobile Computing 4, 5: 658--680. http://dx.doi.org/10.1016/j.pmcj.2008.05.005. Google ScholarDigital Library
- Wu Zhou, Xinwen Zhang and Xuxian Jiang. 2013. AppInk: Watermarking Android Apps for Repackaging Deterrence. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ACM, 1--12. http://dx.doi.org/10.1145/2484313.2484315. Google ScholarDigital Library
Index Terms
- A data hiding approach for sensitive smartphone data
Recommendations
Detecting repackaged smartphone applications in third-party android marketplaces
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and PrivacyRecent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized ...
High-Performance Reversible Data Hiding
This paper proposes a high-performance reversible data hiding algorithm based on the block difference histogram of a cover image. If a message is to be embedded into an image, the difference of the block at the maximum point is increased by 1 or left ...
Comments