2020
DOI: 10.3390/computers9040103
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

Abstract: As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in the SNS messenger platforms. Especially, according to existing studies, a novel type of botnet, which is the so-called steganography-based botnet (stego-botnet), can be constructed and implemented in SNS chat messengers. In the stego-botnet, by using various st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…The purpose of steganography is to secretly convey messages that others do not notice on the cover stream. This deceptive method prevents a security system from noticing whether the stream is an important message [16,17]. The initial compressed video steganography research began with a video watermarking method that manipulates the lower bits of the brightness value in the raw video domain, rather than in the compressed domain, to make it visually indistinguishable.…”
Section: Compressed Video Steganography Methodsmentioning
confidence: 99%
“…The purpose of steganography is to secretly convey messages that others do not notice on the cover stream. This deceptive method prevents a security system from noticing whether the stream is an important message [16,17]. The initial compressed video steganography research began with a video watermarking method that manipulates the lower bits of the brightness value in the raw video domain, rather than in the compressed domain, to make it visually indistinguishable.…”
Section: Compressed Video Steganography Methodsmentioning
confidence: 99%
“…The goal of this topic is to design a virtual video chat system combined with virtual reality, which needs to be based on application scenarios, transforming from the original transmission of video data to the transmission of user's face key point data and handling transmission abnormalities [2]. At the same time, because this topic is not based on video streaming instant messaging, but 3D virtual animation video chat, the user sees the expression animation of the virtual animation model during the chat, so the data format transmitted in the network is the dataset of face key points and voice data, and this topic is based on the actual applica-tion scenario; there are high requirements for the noise reduction and echo cancellation of voice; the synchronization of voice and animated expressions and speech optimization become the urgent problems in this project [3,4].…”
Section: Introductionmentioning
confidence: 99%