Affiliation:
1. National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan
Abstract
With the prevalence of smartphones, message exchanges via mobile chatting programs like LINE have become popular. The messages in the form of chat records in a LINE chat history, after being downloaded for legal uses, might be tampered with illicitly. A novel method for authenticating the chat history against such attacks is proposed. The signal used for authenticating each chat-record segment is created by concatenating the ID label of the segment and a digest yielded by hashing the segment content. The signal is then encoded by three types of spacing code, namely half space, full space, and tab, and embedded into the blank-space areas created by the tab codes in the chat records of the segment. Authentication of a history file is accomplished by extracting the authentication signals embedded in the file and comparing them with the original signals computed directly from the file. The embedded signals are invisible, arousing no suspicion from the hacker. The signals are fragile, because any modification of the records can be detected by the authentication process. Experiments for testing four types of tampering with text files of four languages have been conducted, yielding correct authentication results that show the feasibility of the proposed method.
Funder
National Science Council, Taiwan
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture
Reference27 articles.
1. LINE Corporation. 2019. LINE: Free Calls & Messages. Retrieved October 10 2019 from https://line.me/en/.
2. Wikipedia. 2021. Facebook Messenger. Retrieved March 25 2021 from https://en.wikipedia.org/wiki/Facebook_Messenger.
3. Wikipedia. 2021. Instagram. Retrieved March 28 2021 from https://en.wikipedia.org/wiki/Instagram.
4. LINE Corporation. 2019. Responding to Law Enforcement Agencies Retrieved April 15 2021 from https://linecorp.com/en/security/article/35.
5. Digital steganography: hiding data within data
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献