Behavior Steganography in Social Network
Most modern steganographic techniques embed secret data into digital multimedia by slight modifying the cover data. This work proposes a novel steganographic scheme converting the secret data into the behaviors of individuals in social network, not the multimedia data. In the scheme, a sender makes “love” marks on the news published by his friends with given rates for representing the secret data, and a receiver who is a friend of the sender can extract the secret data from a part of the sender’s “love” marks although some “love” marks made by the sender may be invisible to the receiver.
KeywordsSteganography behavior social network
Unable to display preview. Download preview PDF.
- 1.J. Fridrich, Steganography in digital media: principles, algorithms and applications. Cam-bridge, U.K.: Cambridge Univ. Press, 2010.Google Scholar
- 2.B. Li, M. Wang, X. Li, S. Tan, and J. Huang, A Strategy of Clustering Modification Direc-tions in Spatial Image Steganography. IEEE Trans. Information Forensics and Security, 10(9), pp. 1905-1917, 2015.Google Scholar
- 3.R. Cogranne and J. Fridrich, Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory. IEEE Trans. Infor-mation Forensics and Security, 10(12), pp. 2627-2642, 2015.Google Scholar
- 4.J. Yu, F. Li, H. Cheng, and X. Zhang, Spatial Steganalysis Using Contrast of Residuals. IEEE Signal Processing Letters, 23(7), pp. 989-992, 2016.Google Scholar