Authentication of LINE Chat History Files by Information Hiding

Author:

Wu Da-Chun1ORCID,Hsu Yu-Tsung1

Affiliation:

1. National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan

Abstract

With the prevalence of smartphones, message exchanges via mobile chatting programs like LINE have become popular. The messages in the form of chat records in a LINE chat history, after being downloaded for legal uses, might be tampered with illicitly. A novel method for authenticating the chat history against such attacks is proposed. The signal used for authenticating each chat-record segment is created by concatenating the ID label of the segment and a digest yielded by hashing the segment content. The signal is then encoded by three types of spacing code, namely half space, full space, and tab, and embedded into the blank-space areas created by the tab codes in the chat records of the segment. Authentication of a history file is accomplished by extracting the authentication signals embedded in the file and comparing them with the original signals computed directly from the file. The embedded signals are invisible, arousing no suspicion from the hacker. The signals are fragile, because any modification of the records can be detected by the authentication process. Experiments for testing four types of tampering with text files of four languages have been conducted, yielding correct authentication results that show the feasibility of the proposed method.

Funder

National Science Council, Taiwan

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture

Reference27 articles.

1. LINE Corporation. 2019. LINE: Free Calls & Messages. Retrieved October 10 2019 from https://line.me/en/.

2. Wikipedia. 2021. Facebook Messenger. Retrieved March 25 2021 from https://en.wikipedia.org/wiki/Facebook_Messenger.

3. Wikipedia. 2021. Instagram. Retrieved March 28 2021 from https://en.wikipedia.org/wiki/Instagram.

4. LINE Corporation. 2019. Responding to Law Enforcement Agencies Retrieved April 15 2021 from https://linecorp.com/en/security/article/35.

5. Digital steganography: hiding data within data

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Video Insights Application, A Machine Learning Approach;2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N);2023-12-15

2. CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks;Journal of Information Security and Applications;2022-12

3. Steganalysis of Compressed Speech Based on Association Rule Mining;IEEE Access;2022

4. Steganalysis of Compressed Speech Based on Global and Local Correlation Mining;IEEE Access;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3