Skip to main content

2018 | OriginalPaper | Buchkapitel

SLIDE: An Efficient Secure Linguistic Steganography Detection Protocol

verfasst von : Linghao Zhang, Sheng Wang, Wei Gan, Chao Tang, Jie Zhang, Huihui Liang

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Linguistic steganography detection aims at distinguishing between normal text and stego-text. In this paper, based on homomorphic cryptosystem, we propose an efficient secure protocol for linguistic steganography detection. The protocol involves a vendor holding a private detector of linguistic steganography and a user in possession of some private text documents consisting of stego-text and normal text. By cooperatively performing the secure two-party protocol, the user can securely obtain the detection results of his private documents returned by the vendor’s remote detector while both vendor and user learn nothing about the privacy of each other. It is shown the proposed protocol is still secure against probe attack. Experiment result and theoretical analysis confirm the efficiency, correctness, security, computation complexity and communication overheads of our scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: the 8th Workshop on Multimedia and Security, pp. 146–151. ACM (2006) Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: the 8th Workshop on Multimedia and Security, pp. 146–151. ACM (2006)
2.
Zurück zum Zitat Brickell, J., Porter, D., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: the 14th ACM Conference on Computer and Communications Security, pp. 498–507 (2007) Brickell, J., Porter, D., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: the 14th ACM Conference on Computer and Communications Security, pp. 498–507 (2007)
3.
Zurück zum Zitat Chang, W., Wu, J.: Privacy-preserved data publishing of evolving online social networks. J. Inf. Privacy Secur. 12(1), 14–31 (2016)CrossRef Chang, W., Wu, J.: Privacy-preserved data publishing of evolving online social networks. J. Inf. Privacy Secur. 12(1), 14–31 (2016)CrossRef
4.
Zurück zum Zitat Chang, W., Wu, J., Tan, C.C.: Friendship-based location privacy in mobile social networks. Int. J. Secur. Netw. 6(4), 226–236 (2011)CrossRef Chang, W., Wu, J., Tan, C.C.: Friendship-based location privacy in mobile social networks. Int. J. Secur. Netw. 6(4), 226–236 (2011)CrossRef
5.
Zurück zum Zitat Chen, Z., Huang, L., Yu, Z., Li, L., Yang, W.: Text information hiding detecting algorithm based on statistics. J. Chin. Comput. Syst. 29(12), 2199–2201 (2008) Chen, Z., Huang, L., Yu, Z., Li, L., Yang, W.: Text information hiding detecting algorithm based on statistics. J. Chin. Comput. Syst. 29(12), 2199–2201 (2008)
7.
Zurück zum Zitat Chen, Z.: Research on analysis and design of linguistic steganography. Ph.D. thesis, University of Science and Technology of China (2009) Chen, Z.: Research on analysis and design of linguistic steganography. Ph.D. thesis, University of Science and Technology of China (2009)
8.
Zurück zum Zitat Goldreich, O.: Foundations of Cryptography: Volume II, Basic Applications. Cambridge University Press, Cambridge (2004)CrossRef Goldreich, O.: Foundations of Cryptography: Volume II, Basic Applications. Cambridge University Press, Cambridge (2004)CrossRef
10.
Zurück zum Zitat Jiang, W., Murugesan, M., Clifton, C., Si, L.: Similar document detection with limited information disclosure. In: Proceedings of 24th IEEE ICDE, pp. 735–743 (2008) Jiang, W., Murugesan, M., Clifton, C., Si, L.: Similar document detection with limited information disclosure. In: Proceedings of 24th IEEE ICDE, pp. 735–743 (2008)
11.
Zurück zum Zitat Li, X., Zhu, Y., Wang, J.: Efficient encrypted data comparison through a hybrid method. J. Inf. Sci. Eng. 33(4), 953–964 (2017)MathSciNet Li, X., Zhu, Y., Wang, J.: Efficient encrypted data comparison through a hybrid method. J. Inf. Sci. Eng. 33(4), 953–964 (2017)MathSciNet
12.
Zurück zum Zitat Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. VLDB J. 19(4), 457–475 (2010)CrossRef Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. VLDB J. 19(4), 457–475 (2010)CrossRef
14.
Zurück zum Zitat Taskiran, C., Topkara, U., Topkara, M., Delp, E.: Attacks on lexical natural language steganography systems. Proc. SPIE 6072, 97–105 (2006) Taskiran, C., Topkara, U., Topkara, M., Delp, E.: Attacks on lexical natural language steganography systems. Proc. SPIE 6072, 97–105 (2006)
15.
Zurück zum Zitat Zhao, Y., Li, W., Lu, S.: Navigation-driven handoff minimization in wireless networks. J. Netw. Comput. Appl. 74, 11–20 (2016)CrossRef Zhao, Y., Li, W., Lu, S.: Navigation-driven handoff minimization in wireless networks. J. Netw. Comput. Appl. 74, 11–20 (2016)CrossRef
16.
Zurück zum Zitat Zhou, J., Niu, X., Yang, Y.: Research on the detecting algorithm of text document information hiding. J. Commun. 25(12), 97–101 (2004) Zhou, J., Niu, X., Yang, Y.: Research on the detecting algorithm of text document information hiding. J. Commun. 25(12), 97–101 (2004)
17.
Zurück zum Zitat Zhou, L., Zhu, Y., Castiglione, A.: Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69, 84–96 (2017)CrossRef Zhou, L., Zhu, Y., Castiglione, A.: Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69, 84–96 (2017)CrossRef
18.
Zurück zum Zitat Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gen. Comput. Syst. 81, 404–413 (2018)CrossRef Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gen. Comput. Syst. 81, 404–413 (2018)CrossRef
19.
Zurück zum Zitat Zhu, Y., Huang, L., Yang, W.: Relation of PPAtMP and scalar product protocol and their applications. In: IEEE Symposium on Computers and Communications (ISCC), pp. 184–189 (2010) Zhu, Y., Huang, L., Yang, W.: Relation of PPAtMP and scalar product protocol and their applications. In: IEEE Symposium on Computers and Communications (ISCC), pp. 184–189 (2010)
20.
Zurück zum Zitat Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016)CrossRef Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016)CrossRef
21.
Zurück zum Zitat Zhu, Y., Li, X., Wang, J., Liu, Y., Qu, Z.: Practical secure naïve bayesian classification over encrypted big data in cloud. Int. J. Found. Comput. Sci. 28(06), 683–703 (2017)CrossRef Zhu, Y., Li, X., Wang, J., Liu, Y., Qu, Z.: Practical secure naïve bayesian classification over encrypted big data in cloud. Int. J. Found. Comput. Sci. 28(06), 683–703 (2017)CrossRef
Metadaten
Titel
SLIDE: An Efficient Secure Linguistic Steganography Detection Protocol
verfasst von
Linghao Zhang
Sheng Wang
Wei Gan
Chao Tang
Jie Zhang
Huihui Liang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_28