Abstract

We develop and evaluate a data hiding method that enables smartphones to encrypt and embed sensitive information into carrier streams of sensor data. Our evaluation considers multiple handsets and a variety of data types, and we demonstrate that our method has a computational cost that allows real-time data hiding on smartphones with negligible distortion of the carrier stream. These characteristics make it suitable for smartphone applications involving privacy-sensitive data such as medical monitoring systems and digital forensics tools.


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.1145/2971648.2971686
https://people.eng.unimelb.edu.au/vkostakos/files/papers/ubicomp16c.pdf,
http://jultika.oulu.fi/files/nbnfi-fe201709048471.pdf,
https://core.ac.uk/display/86546370,
http://jultika.oulu.fi/Record/nbnfi-fe201709048471,
http://epubs.surrey.ac.uk/844822,
https://dl.acm.org/citation.cfm?id=2971686,
https://doi.acm.org/10.1145/2971648.2971686,
https://findanexpert.unimelb.edu.au/scholarlywork/1189979-a-data-hiding-approach-for-sensitive-smartphone-data,
https://doi.org/10.1145/2971648.2971686,
https://people.eng.unimelb.edu.au/vkostakos/publications.php?key=RN10682,
https://dl.acm.org/citation.cfm?id=2971648.2971686,
https://research.aalto.fi/en/publications/a-data-hiding-approach-for-sensitive-smartphone-data(94f699bc-c1fd-4a14-a714-e075e98e4e34).html,
https://academic.microsoft.com/#/detail/2510588241
http://dx.doi.org/10.1145/2971648.2971686 under the license http://www.acm.org/publications/policies/copyright_policy#Background
Back to Top

Document information

Published on 01/01/2016

Volume 2016, 2016
DOI: 10.1145/2971648.2971686
Licence: Other

Document Score

0

Views 1
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?