2020
DOI: 10.1080/02564602.2020.1721340
|View full text |Cite
|
Sign up to set email alerts
|

Steganography in Social Networks Based on Behavioral Correlation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Hu et al proposed behavioral steganography based on the 0-1 knapsack algorithm. They used CMI coding to solve the high bit error rate when transmitting a large number of continuous and identical confidential information [6].…”
Section: -1 Knapsack Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…Hu et al proposed behavioral steganography based on the 0-1 knapsack algorithm. They used CMI coding to solve the high bit error rate when transmitting a large number of continuous and identical confidential information [6].…”
Section: -1 Knapsack Problemmentioning
confidence: 99%
“…Steganography [2,6], known as hiding the existence of data, can be defined as the technology of using information embedding algorithms to hide confidential information on non-secret networks. Continuous improvements in steganalysis techniques reduce the reliability of traditional steganography day by day.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…References [7,16,18] collect and fit the user's behavior frequency to avoid anomalies caused by the sender's behaviors. For this reason, we take the same method to ensure resistance to detection.…”
Section: Experiments and Evaluation On Detection Resistancementioning
confidence: 99%
“…e behavioral steganography method of marking "love" attempts to send message in the WeChat Moments, which is widely used in China, but there are insufficient embedding capacity and detection resistance. In view of the problem that the relationship between friends is not considered in [17], Hu et al [18] use the behavioral correlation between sender and friend to calculate the reasonable probability of marking "love" on a social network, which improves the security, but the embedding capacity needs to be improved. Regarding the "prisoner model," the security issue between sender and receiver is not considered; Yang et al [7] give a constraint framework to ensure content security and behavioral security and provide a reference method for the behavioral security of social network steganography.…”
Section: Introductionmentioning
confidence: 99%