[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Authentication of LINE Chat History Files by Information Hiding

Published: 27 January 2022 Publication History

Abstract

With the prevalence of smartphones, message exchanges via mobile chatting programs like LINE have become popular. The messages in the form of chat records in a LINE chat history, after being downloaded for legal uses, might be tampered with illicitly. A novel method for authenticating the chat history against such attacks is proposed. The signal used for authenticating each chat-record segment is created by concatenating the ID label of the segment and a digest yielded by hashing the segment content. The signal is then encoded by three types of spacing code, namely half space, full space, and tab, and embedded into the blank-space areas created by the tab codes in the chat records of the segment. Authentication of a history file is accomplished by extracting the authentication signals embedded in the file and comparing them with the original signals computed directly from the file. The embedded signals are invisible, arousing no suspicion from the hacker. The signals are fragile, because any modification of the records can be detected by the authentication process. Experiments for testing four types of tampering with text files of four languages have been conducted, yielding correct authentication results that show the feasibility of the proposed method.

References

[1]
LINE Corporation. 2019. LINE: Free Calls & Messages. Retrieved October 10, 2019 from https://line.me/en/.
[2]
Wikipedia. 2021. Facebook Messenger. Retrieved March 25, 2021 from https://en.wikipedia.org/wiki/Facebook_Messenger.
[3]
Wikipedia. 2021. Instagram. Retrieved March 28, 2021 from https://en.wikipedia.org/wiki/Instagram.
[4]
LINE Corporation. 2019. Responding to Law Enforcement Agencies, Retrieved April 15, 2021 from https://linecorp.com/en/security/article/35.
[5]
Donovan Artz. 2001. Digital steganography: Hiding data within data. IEEE Internet Computing 5, 3 (2001), 75–80. DOI:https://doi.org/10.1109/4236.935180
[6]
Nopporn Chotikakamthorn. 1999. Document image data hiding technique using character spacing width sequence coding. In Proceedings of the International Conference on Image Processing. 250–254. DOI:
[7]
I.-Shi Lee and Wen-Hsiang Tsai. 2008. Data hiding in emails and applications using unused ASCII control codes. Journal of Information Technology and Applications 3, 1 (2008), 13–24.
[8]
Lipi Kothari, Rikin Thakkar, and Satvik Khara. 2017. Data hiding on web using combination of steganography and cryptography. In Proceedings of the International Conference on Computer, Communications, and Electronics. 448–452. DOI:
[9]
Walter Bender, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. 1996. Techniques for data hiding. IBM System Journal 35, 3.4 (1996), 313–336. DOI:https://doi.org/10.1147/sj.353.0313
[10]
K. Winstein. 2019. Lexical Steganography Through Adaptive Modulation of the Word Choice Hash. Retrieved July 15, 2019 from http://web.mit.edu/keithw/tlex/.
[11]
Tatwadarshi P. Nagarhalli. 2014. A new approach to SMS text steganography using emoticons. In Proceedings of the National Conference on the Role of Engineers in Nation Building. 103–105.
[12]
Tsung-Yuan Liu and Wen-Hsiang Tsai. 2007. A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security 2, 1 (2007), 24–30. DOI:https://doi.org/10.1109/TIFS.2006.890310
[13]
Khan Farhan Rafat. 2009. Enhanced text steganography in SMS. In Proceedings of the 2nd IEEE International Conference on Computer, Control, and Communication. 1–6. DOI:
[14]
Natthawut Samphaiboon. 2011. Steganography via running short text messages. Multimedia Tools and Applications 52 (2011), 569–596. DOI:https://doi.org/10.1007/s11042-009-0432-3
[15]
M. Hassan Shirali-Shahreza and Mohammad Shirali-Shahreza. 2007. Text steganography in chat. In Proceedings of the 3rd IEEE/IFIP International Conference in Central Asia on Internet. 1–5. DOI:https://doi.org/10.1109/CANET.2007.4401716
[16]
Yu-Tsung Hsu and Da-Chun Wu. 2019. Authentication of LINE chat records by information hiding techniques. In Proceedings of the 2019 Cryptology and Information Security Conference.
[17]
Wikipedia. 2021. HTML. Retrieved April 5, 2021 from https://en.wikipedia.org/wiki/HTML.
[18]
JSON org. 2021. Introducing JSON. Retrieved April 10, 2021 from https://www.json.org.
[19]
Chang-Chou Lin and Wen-Hsiang Tsai. 2014. Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 3 (2014), 405–414. DOI:https://doi.org/10.1016/S0164-1212(03)00239-5
[20]
Tomas Schild. 2019. Search for Character(s) in Unicode 13.0.0. Retrieved November 8, 2021 from https://unicode-search.net/.
[21]
Unicode Inc. 2019. Unicode: World Standard for Text and Emoji. Retrieved September 16, 2019 from https://home.unicode.org/.
[22]
Ling Song, Guohong Liao, and Jian Guo. 2017. Non-full Sbox linearization: Applications to collision attacks on round-reduced Keccak. In Proceedings of the Annual International Cryptology Conference. 428–451.
[23]
Sandcastle Documented Class Library. 2019. SHA3.Shake256 Method. Retrieved September 30, 2019 from http://mathmesh.com/Code/mmm/html/86c2bae1-9518-e8ae-e1f5-5a7712812f1b.htm.
[24]
NIST. 2019. SHA-3 Project - Hash Functions | CSRC. Retrieved September 22, 2019 from https://csrc.nist.gov/projects/hash-functions/sha-3-project.
[25]
Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. 1998. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16, 4 (1998), 573–586. DOI:https://doi.org/10.1109/49.668979
[26]
Renjie Zhu, Xinpeng Zhang, Mengte Shi, and Zhenjun Tang. 2020. Secure neural network watermarking protocol against forging attack. EURASIP Journal on Image and Video Processing 2020, 37 (2020), 1–12. DOI:
[27]
Matt L. Miller, Ingemar J. Cox, Jean-Paul M. G. Linnartz, and Ton Kalker. 1999. A review of watermarking principles and practices. In Digital Signal Processing in Multimedia Systems, Keshab K. Parhi and Takao Nishitani (Eds.). CRC Press, Boca Raton, FL, 461–485. DOI:

Cited By

View all
  • (2024)Exploring Visual Relationships via Transformer-based Graphs for Enhanced Image CaptioningACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363855820:5(1-23)Online publication date: 22-Jan-2024
  • (2023)Complementary Coarse-to-Fine Matching for Video Object SegmentationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/359649619:6(1-21)Online publication date: 12-Jul-2023
  • (2023)A2SC: Adversarial Attacks on Subspace ClusteringACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358709719:6(1-23)Online publication date: 12-Jul-2023
  • Show More Cited By

Index Terms

  1. Authentication of LINE Chat History Files by Information Hiding

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 1
    January 2022
    517 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3505205
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 January 2022
    Accepted: 01 July 2021
    Revised: 01 May 2021
    Received: 01 November 2020
    Published in TOMM Volume 18, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. LINE chat history
    2. authentication
    3. information hiding
    4. tab code
    5. half and full spaces

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Science Council, Taiwan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)42
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Exploring Visual Relationships via Transformer-based Graphs for Enhanced Image CaptioningACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363855820:5(1-23)Online publication date: 22-Jan-2024
    • (2023)Complementary Coarse-to-Fine Matching for Video Object SegmentationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/359649619:6(1-21)Online publication date: 12-Jul-2023
    • (2023)A2SC: Adversarial Attacks on Subspace ClusteringACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358709719:6(1-23)Online publication date: 12-Jul-2023
    • (2023)Robust Video Stabilization based on Motion DecompositionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358049819:5(1-24)Online publication date: 16-Mar-2023
    • (2023)LSTAloc: A Driver-Oriented Incentive Mechanism for Mobility-on-Demand Vehicular Crowdsensing MarketIEEE Transactions on Mobile Computing10.1109/TMC.2023.327167123:4(3106-3122)Online publication date: 1-May-2023
    • (2023)Video Insights Application, A Machine Learning Approach2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)10.1109/ICAC3N60023.2023.10541630(389-394)Online publication date: 15-Dec-2023
    • (2022)Real Time Facial Expression Recognition for Online LectureWireless Communications & Mobile Computing10.1155/2022/96842642022Online publication date: 1-Jan-2022
    • (2022)A Normalized Slicing-assigned Virtualization Method for 6G-based Wireless Communication SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/354607718:3s(1-18)Online publication date: 1-Nov-2022
    • (2022)Steganalysis of Compressed Speech Based on Association Rule MiningIEEE Access10.1109/ACCESS.2022.320970310(103337-103348)Online publication date: 2022
    • (2022)Steganalysis of Compressed Speech Based on Global and Local Correlation MiningIEEE Access10.1109/ACCESS.2022.319405110(78472-78483)Online publication date: 2022
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media