A data hiding approach for sensitive smartphone data

C Luo, A Fylakis, J Partala, S Klakegg… - Proceedings of the …, 2016 - dl.acm.org
We develop and evaluate a data hiding method that enables smartphones to encrypt and
embed sensitive information into carrier streams of sensor data. Our evaluation considers …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

[图书][B] Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols

MT Raggo, C Hosmer - 2012 - books.google.com
As data hiding detection and forensic techniques have matured, people are creating more
advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all …

Data hiding: current trends, innovation and potential challenges

AK Singh - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
With the widespread growth of digital information and improved internet technologies, the
demand for improved information security techniques has significantly increased due to …

Information hiding techniques for cryptography and steganography

Bhawna, S Kumar, V Singh - … : Proceedings of ICMDE 2020, Volume 2, 2020 - Springer
Cyber-attack is a category of attack that uses malicious code for intentionally altering the
computer data, exploiting computer systems and networks, which might result in disruptive …

Data hiding: New opportunities for security and privacy?

D Megías - Proceedings of the 2020 European Interdisciplinary …, 2020 - dl.acm.org
Data hiding provides a collection of techniques that can be used within a wider cybersecurity
or privacy framework, making it possible, for example, to protect the users' privacy in …

Privacy protection for medical data sharing in smart healthcare

L Fang, C Yin, J Zhu, C Ge, M Tanveer… - ACM Transactions on …, 2020 - dl.acm.org
In virtue of advances in smart networks and the cloud computing paradigm, smart healthcare
is transforming. However, there are still challenges, such as storing sensitive data in …

This sneaky piggy went to the android ad market: Misusing mobile sensors for stealthy data exfiltration

M Diamantaris, S Moustakas, L Sun… - Proceedings of the …, 2021 - dl.acm.org
Mobile sensors have transformed how users interact with modern smartphones and
enhance their overall experience. However, the absence of sufficient access control for …

POSTER: Watch out your smart watch when paired

Y Lee, WS Yang, T Kwon - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We coin a new term called\textit {data transfusion} as a phenomenon that a user
experiences when pairing a wearable device with the host device. A large amount of data …

Digital watermarking of medical images for mobile devices

CN Gutierrez, G Kakani, RC Verma… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Mobile devices are widely available to both consumers and businesses at affordable prices.
These devices have the computational power to achieve tasks that were infeasible a few …