2011 International Conference on Broadband and Wireless Computing, Communication and Applications 2011
DOI: 10.1109/bwcca.2011.60
|View full text |Cite
|
Sign up to set email alerts
|

Steganography and Secure Communication on Online Social Networks and Online Photo Sharing

Abstract: On the in Internet today, there are numerous websites offering places to store and share images (photos, drawings, cliparts, etc.). Online Social Networks (OSN) and Online Photo Services (OPS) usually offer this type of service making it possible to upload and manage the images they publish. Users can publish their own images as well as add descriptions and tags. By adjusting the personal privacy settings, the images become visible only to authorized users, with it then being possible to add any comments. Gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…Moreover data might also be intentionally hidden to the user view, for example setting the foreground color of the text equal to the page background color or using more sophisticated steganographic techniques ( [26], [27]). …”
Section: ) Input Eventsmentioning
confidence: 99%
“…Moreover data might also be intentionally hidden to the user view, for example setting the foreground color of the text equal to the page background color or using more sophisticated steganographic techniques ( [26], [27]). …”
Section: ) Input Eventsmentioning
confidence: 99%
“…The authors also propose using such a channel to establish the location of the appropriate steganogram, and they indicate Internet services, for instance social networks, as a carrier. Proposals of low entropy steganographic methods are presented in [7]. The first one uses file names as a hidden information carrier and requires OSNs not to change them.…”
Section: B Use Of Osns In Steganographymentioning
confidence: 99%
“…However, the use of steganography has not been examined. Realizing that user images are usually processed on OSNs, Castiglione et al [21] propose the use of the name and tags of the images as an alternative means of hiding information and thereby establishing a secret communication channel. In summary, thus far there is no thorough investigation on how the processing of images on public photo-sharing sites impacts different information hiding techniques.…”
Section: Background and Related Workmentioning
confidence: 99%