{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T19:10:02Z","timestamp":1755976202549,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2313139, CNS-1928331, CNS-1928349, CNS-2225424"],"award-info":[{"award-number":["CNS-2313139, CNS-1928331, CNS-1928349, CNS-2225424"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3643650.3658607","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T01:28:07Z","timestamp":1718328487000},"page":"21-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6513-5447","authenticated-orcid":false,"given":"Lichen","family":"Xia","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7177-325X","authenticated-orcid":false,"given":"Jinghui","family":"Liao","sequence":"additional","affiliation":[{"name":"Wayne State University, Detroit, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9173-156X","authenticated-orcid":false,"given":"Niusen","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9372-9607","authenticated-orcid":false,"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5864-4675","authenticated-orcid":false,"given":"Weisong","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. ARM TrustZone Technology. https:\/\/developer.arm.com\/ip-products\/ security-ip\/trustzone"},{"key":"e_1_3_2_1_2_1","unstructured":"2022. The Best Defense Against Rubber-Hose Cryptanalysis. https:\/\/pluralistic.net\/2022\/03\/27\/the-best-defense-against-rubber-hosecryptanalysis\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Discrete cosine transform","author":"Ahmed Nasir","year":"1974","unstructured":"Nasir Ahmed, T_ Natarajan, and Kamisetty R Rao. 1974. Discrete cosine transform. IEEE transactions on Computers 100, 1 (1974), 90--93."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. 2023. Silicon IP Security. https:\/\/www.arm.com\/products\/silicon-ipsecurity. Accessed: 2024-02--25."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594445"},{"key":"e_1_3_2_1_6_1","volume-title":"User-friendly deniable storage for mobile devices. computers & security 72","author":"Chang Bing","year":"2018","unstructured":"Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, and Zhan Wang. 2018. User-friendly deniable storage for mobile devices. computers & security 72 (2018), 163--174."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818046"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818046"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00054"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0071"},{"key":"e_1_3_2_1_11_1","volume-title":"The 30th Usenix Security Symposium.","author":"Chen Chen","year":"2021","unstructured":"Chen Chen, Anrin Chakraborti, and Radu Sion. 2021. PEARL: Plausibly Deniable Flash Translation Layer using WOM coding. In The 30th Usenix Security Symposium."},{"key":"e_1_3_2_1_12_1","volume-title":"HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System","author":"Chen Niusen","year":"2023","unstructured":"Niusen Chen and Bo Chen. 2023. HiPDS: A Storage Hardware-independent Plausibly Deniable Storage System. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_1_13_1","volume-title":"MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices. In EAI International Conference on Applied Cryptography in Computer and Communications. Springer, 138--154","author":"Chen Niusen","year":"2021","unstructured":"Niusen Chen, Bo Chen, and Weisong Shi. 2021. MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices. In EAI International Conference on Applied Cryptography in Computer and Communications. Springer, 138--154."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17081-2_9"},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer, 150--169","author":"Chen Niusen","year":"2022","unstructured":"Niusen Chen, Bo Chen, and Weisong Shi. 2022. A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. In International Conference on Security and Privacy in Communication Systems. Springer, 150--169."},{"key":"e_1_3_2_1_16_1","unstructured":"OP-TEE Contributors. 2021. OP-TEE\/manifest. https:\/\/github.com\/OP-TEE\/ manifest GitHub repository."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1000\/jcdf.2021.15.3.105"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Wendi Feng Chuanchang Liu Zehua Guo Thar Baker Gang Wang Meng Wang Bo Cheng and Junliang Chen. 2020. MobiGyges: A mobile hidden volume for preventing data loss improving storage utilization and avoiding device reboot. Future Generation Computer Systems (2020).","DOI":"10.1016\/j.future.2020.03.048"},{"key":"e_1_3_2_1_19_1","unstructured":"Seung-Kyun Han and Jinsoo Jang. 2023. MyTEE: Own the Trusted Execution Environment on Embedded Devices.. In NDSS."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.04.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1000\/csr.2019.14.2.89"},{"key":"e_1_3_2_1_23_1","volume-title":"2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 441--447","author":"Liao Jinghui","year":"2021","unstructured":"Jinghui Liao, Bo Chen, and Weisong Shi. 2021. TrustZone enhanced plausibly deniable encryption system for mobile devices. In 2021 IEEE\/ACM Symposium on Edge Computing (SEC). IEEE, 441--447."},{"key":"e_1_3_2_1_24_1","volume-title":"FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices. In 2024 ACM Conference on Data and Application Security and Privacy (CODASPY). ACM.","author":"Liao Jinghui","year":"2024","unstructured":"Jinghui Liao, Niusen Chen, Lichen Xia, Bo Chen, and Weisong Shi. 2024. FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices. In 2024 ACM Conference on Data and Application Security and Privacy (CODASPY). ACM."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983175"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"e_1_3_2_1_27_1","volume-title":"Open Portable Trusted Execution Environment. https:\/\/www.optee. org\/","author":"OP-TEE.","year":"2019","unstructured":"OP-TEE. 2019. Open Portable Trusted Execution Environment. https:\/\/www.optee. org\/ (2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"DEFY: A deniable, encrypted file system for log-structured storage.","author":"Peters Timothy M","year":"2015","unstructured":"Timothy M Peters, Mark A Gondree, and Zachary NJ Peterson. 2015. DEFY: A deniable, encrypted file system for log-structured storage. (2015)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.157290"},{"key":"e_1_3_2_1_30_1","volume-title":"On Implementing Deniable Storage Encryption for Mobile Devices. In 20th Annual Network and Distributed System Security Symposium, NDSS","author":"Skillen Adam","year":"2013","unstructured":"Adam Skillen and MohammadMannan. 2013. On Implementing Deniable Storage Encryption for Mobile Devices. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24--27."},{"key":"e_1_3_2_1_31_1","volume-title":"Image steganography: A review of the recent advances","author":"Subramanian Nandhini","year":"2021","unstructured":"Nandhini Subramanian, Omar Elharrouss, Somaya Al-Maadeed, and Ahmed Bouridane. 2021. Image steganography: A review of the recent advances. IEEE access 9 (2021), 23409--23423."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013204"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_36"},{"key":"e_1_3_2_1_34_1","volume-title":"A new approach to reliable detection of LSB steganography in natural images. Signal processing 83, 10","author":"Zhang Tao","year":"2003","unstructured":"Tao Zhang and Xijian Ping. 2003. A new approach to reliable detection of LSB steganography in natural images. Signal processing 83, 10 (2003), 2085--2093."}],"event":{"name":"CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Porto Portugal","acronym":"CODASPY '24"},"container-title":["Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643650.3658607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643650.3658607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:38:30Z","timestamp":1755974310000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643650.3658607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":34,"alternative-id":["10.1145\/3643650.3658607","10.1145\/3643650"],"URL":"https:\/\/doi.org\/10.1145\/3643650.3658607","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2024-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}