PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

StegHash : New Method for Information Hiding in Open Social Networks

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.
Słowa kluczowe
Rocznik
Strony
347--352
Opis fizyczny
Bibliogr. 14 poz., il., tab., wykr.
Twórcy
  • Warsaw University of Technology, Warsaw, Poland; Cryptomage SA, Wrocław, Poland
Bibliografia
  • [1] K. Szczypiorski, “StegIbiza: a New Method for Information Hiding in Club Music”, Proceedings of the 2nd International Conference on Frontiers of Signal Processing (ICFSP 2016), Warsaw, Poland, 15-17 October 2016, pp. 20-24.
  • [2] J. Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”, Cambridge University Press; 1 edition, December 2009.
  • [3] W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, K. Szczypiorski, “Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures”, Wiley-IEEE Press; 1 edition, February 2016.
  • [4] M. Chapman, G. Davida, and M. Rennhard, “A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography”, Proceedings of the Information Security Conference, October 2001, pp. 156-165.
  • [5] O. Tsur, A. Rappoport, “What's in a hashtag?: content based prediction of the spread of ideas in microblogging communities”, Proceedings of the fifth ACM international conference on Web search and data mining, ACM 2012 February, 2012, pp. 643-652.
  • [6] J. Ning, I. Singh, H. Madhyastha, S. Krishnamurthy, G. Cao, P. Mohapatra, “Secret message sharing using online social media”, Proceedings of the Communications and Network Security (CNS), 2014 IEEE Conference on, 319-327.
  • [7] J. Hiney, T. Dakve, K. Szczypiorski and K. Gaj, "Using Facebook for Image Steganography", Proceedings of the Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, 2015, pp. 442-447.
  • [8] W. Frączek, K. Szczypiorski, “Perfect undetectability of network steganography” Security and Communications Network, Wiley, Volume 9, Issue 15, October 2016, pp. 2998–3010.
  • [9] K. Szczypiorski, I. Margasiński, W. Mazurczyk, K. Cabaj, and P. Radziszewski, “TrustMAS: Trusted Communication Platform for Multi-Agent Systems”, In Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems (OTM '08), Robert Meersman and Zahir Tari (Eds.). Springer-Verlag, Berlin, Heidelberg, pp. 1019-1035.
  • [10] F. Beato, E. De Cristofaro and K. B. Rasmussen, "Undetectable communication: The Online Social Networks case," Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, Toronto, ON, 2014, pp. 19-26.
  • [11] A. Castiglione, B. D'Alessio and A. De Santis, "Steganography and Secure Communication on Online Social Networks and Online Photo Sharing," Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on, Barcelona, 2011, pp. 363-368.
  • [12] A. Wilson, P. Blunsom, A. Ker: “Linguistic Steganography on Twitter: Hierarchical Language Modelling with Manual Interaction”, Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014, 902803 (February 19, 2014).
  • [13] National Institute of Standards and Technology: FIPS PUB 180-4: Secure Hash Standard. Federal Information Processing Standards Publication 180-4, U.S. Department of Commerce (March 2012).
  • [14] K. Szczypiorski, A. Janicki, S. Wendzel: “The Good, The Bad And The Ugly: Evaluation of Wi-Fi Steganography”, Journal of Communications (JCM), Vol. 10(10), pp. 747-752, 2015.
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ade37e45-043a-4b28-9142-d011b079e94c
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.