An Investigator Unearths Illegal Behavior via a Subliminal Channel

作者:Chen Chin-Ling*; Shih Tzay-Farn; Wang Kun-hao; Chen Chien-Hung*; Tsaur Woei-Jiunn
来源:Journal of Internet Technology, 2018, 19(2): 573-580.
DOI:10.3966/160792642018031902025

摘要

With the rapid development of the Internet, the number of criminal cases has greatly increased. Therefore, determining how to avoid and reduce illegal behaviors has become an important issue. For example: illegal insider trading of enterprises, commercial spying, etc. Illegal insider trading occurs when somebody in an enterprise trades based on non-public information obtained during the performance of the insider's duties at the corporation, or in breach of a fiduciary or other relationship of trust and confidence, or where the non-public information was misappropriated from the company. In this paper, we propose a novel scheme to protect investigators' safety and ensure the security of the collected evidence via a subliminal channel. We use a cryptographic mechanism to solve the replay attack, forgery attack, non-repudiation, untraceable and authentication issues. Our scheme not only protects investigators' identity and safety but also constitutes a fair arbitration mechanism.

  • 出版日期2018

全文