Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences

被引:4
|
作者
Altschaffel, Robert [1 ]
Hielscher, Jonas [1 ]
Kiltz, Stefan [1 ]
Dittmann, Jana [1 ]
机构
[1] Otto Von Guericke Univ, Res Grp Multimedia & Secur, Magdeburg, Germany
关键词
User identification; Media Stream Forensics; Network Forensics; Meta Data Privacy; Video Conferencing;
D O I
10.1145/3437880.3460412
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our paper presents a systematic approach to investigate whether and how events can be identified and extracted during the use of video conferencing software. Our approach is based on the encrypted meta and multimedia data exchanged during video conference sessions. It relies on the network data stream which contains data interpretable without decryption (plain data) and encrypted data (encrypted content) some of which is decrypted using our approach (decrypted content). This systematic approach uses a forensic process model and the fission of network data streams before applying methods on the specific individual data types. Our approach is applied exemplary to the Zoom Videoconferencing Service (VCSA) with Client Version 5.4.57862.0110 [4], the mobile Android App Client Version 5.5.2 (1328) [4], the webbased client and the servers (accessed between Jan 21st and Feb 4th). The investigation includes over 50 different configurations. For the heuristic speaker identification, two series of nine sets for eight different speakers are collected. The results show that various user data can be derived from characteristics of VCSA encrypted media streams, even if end-to-end encryption is used. The findings suggest user privacy risks. Our approach offers the identification of various events, which enable activity tracking (e.g. camera on/off, increased activity in front of camera) by evaluating heuristic features of the network streams. Further research into user identification within the encrypted audio stream based on pattern recognition using heuristic features of the corresponding network data stream is conducted and suggests the possibility to identify users within a specific set.
引用
收藏
页码:23 / 33
页数:11
相关论文
共 50 条
  • [1] Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences
    Altschaffel, Robert
    Hielscher, Jonas
    Kiltz, Stefan
    Dittmann, Jana
    IH and MMSec 2021 - Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security, 2021, : 23 - 33
  • [2] Image Forensics in the Encrypted Domain
    Yu, Yongqiang
    Lu, Yuliang
    Li, Longlong
    Chen, Feng
    Yan, Xuehu
    ENTROPY, 2024, 26 (11)
  • [3] An encrypted network video stream dataset
    Fesl, Jan
    Sedlak, Daniel
    Macak, Tomas
    Feslova, Marie
    Konopa, Michal
    DATA IN BRIEF, 2023, 49
  • [4] On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
    Khelifi, Fouad
    SIGNAL PROCESSING, 2018, 143 : 336 - 345
  • [5] A Robust, Privacy Preserving Secret Data Concealing Embedding Technique into Encrypted Video Stream
    Santhosh, B.
    Meghana, N. M.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 645 - 655
  • [6] Data Forensics On Social Media
    Doultani, Mannat Amit
    Vijayalakshmi, M.
    2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [7] Universal data embedding in encrypted domain
    Karim, Mustafa S. Abdul
    Wong, KokSheik
    SIGNAL PROCESSING, 2014, 94 : 174 - 182
  • [8] Side-Channel Information Leakage of Encrypted Video Stream in Video Surveillance Systems
    Li, Hong
    He, Yunhua
    Sun, Limin
    Cheng, Xiuzhen
    Yu, Jiguo
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [9] Encrypted Data Stream Identification Based on Pattern Recognition
    Lu, You-Li
    Zhou, Yu-Huan
    Pan, Zhi-Song
    Hu, Gu-Yu
    Cui, Nan
    Meng, Juan
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 914 - 919
  • [10] Data hiding in partially encrypted HEVC video
    Xu, Dawen
    ETRI JOURNAL, 2020, 42 (03) : 446 - 458