Proceedings of the 2nd International Workshop on Multimedia Privacy and Security 2018
DOI: 10.1145/3267357.3267365
|View full text |Cite
|
Sign up to set email alerts
|

Lost in the Digital Wild

Abstract: This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online social networks) in a selected digital world. Different from other traditional schemes, where the hidden information is embedded into one or more selected or generated cover objects, in the new framework the hidden information is embedded in the fact that some part… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…Pantic et al proposed to use Twitter as a zombie network for covert communication by utilizing the length of tweets for steganography [7]. Li et al proposed hiding secret information as bit strings in designated numerical activities to achieve confidential message transmission [8]. These works laid the foundation for behavioral steganography in social networks.…”
Section: Introductionmentioning
confidence: 99%
“…Pantic et al proposed to use Twitter as a zombie network for covert communication by utilizing the length of tweets for steganography [7]. Li et al proposed hiding secret information as bit strings in designated numerical activities to achieve confidential message transmission [8]. These works laid the foundation for behavioral steganography in social networks.…”
Section: Introductionmentioning
confidence: 99%