2016
DOI: 10.1515/eletel-2016-0048
|View full text |Cite
|
Sign up to set email alerts
|

StegHash: New Method for Information Hiding in Open Social Networks

Abstract: In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…The main client application is the SocialStegDisc Shell terminal, which translates the client queries to appropriate operations of the file directory and operations on files, using the Controller module. In addition, two modules known from StegHash [2] have been used: 1) StegHash Engine -a module responsible for the creation of appropriate addressing of multimedia files with the use of hashtags. 2) Database -contains a set of multimedia files used as a carrier of hidden data.…”
Section: A Environmentmentioning
confidence: 99%
See 3 more Smart Citations
“…The main client application is the SocialStegDisc Shell terminal, which translates the client queries to appropriate operations of the file directory and operations on files, using the Controller module. In addition, two modules known from StegHash [2] have been used: 1) StegHash Engine -a module responsible for the creation of appropriate addressing of multimedia files with the use of hashtags. 2) Database -contains a set of multimedia files used as a carrier of hidden data.…”
Section: A Environmentmentioning
confidence: 99%
“…This index plays two roles: 1) Unambiguously identifies the object, 2) Identifies the social network in which it is embedded. In the StegHash system [2], addresses were generated by means of any type of permutation generation algorithm, and uniqueness was ensured by rejecting the already drawn addresses. For SocialStegDisc, generation of addresses in a chain must be characterized by restorability with the use of appropriate initial conditions.…”
Section: B Generation Of Addressesmentioning
confidence: 99%
See 2 more Smart Citations
“…Multimedia content can be used as cover objects because of their size. Many authors [256,176,242,164] describe the ability of communication protocols which can be used among users using pictures uploaded to OSNs with embedded information. Although their work is focused on user's privacy, it shows that malicious users can also take advantage of it depending on the embedded information, ranging from terrorist message to child pornography.…”
Section: Steganographymentioning
confidence: 99%