Social Media and Steganography: Use, Risks and Current Status

被引:2
作者
Gurunath, R. [1 ]
Klaib, Mohammad Fadel Jamil [2 ]
Samanta, Debabrata [1 ]
Khan, Mohammad Zubair [2 ]
机构
[1] CHRIST Deemed Univ, Dept Comp Sci, Bengaluru 560029, Karnataka, India
[2] Taibah Univ, Dept Comp Sci, Madinah Al Munawara 42353, Saudi Arabia
关键词
Social networking (online); Steganography; Blogs; Tools; Internet telephony; Freeware; White spaces; social media; cyber stalking; cyber bullying; steganalysis; OSN; Facebook; Twitter;
D O I
10.1109/ACCESS.2021.3125128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography or data hiding is used to protect the privacy of information in the transit; it has been observed that the information that flows through Online Social Networks (OSN) is very much unsafe. Therefore, people hesitate to communicate their sensitive data on social media.. Most of the information on the online social network is not useful to users and appears to disregard such details. People's actions provided a possibility for digital Steganography through the Internet.. TCPIP covert channels were used for steganography until the last decade. People began to utilize social media as a covert conduit to communicate hidden messages to targeted users as social media grew in popularity. There are numerous Online Social Networks accessible nowadays, ranging from Facebook to the more contemporary Twitter and Instagram. All of them may be utilized as covert channels without the general public noticing. The primary characteristic of steganography is the protection of information privacy; nonetheless, it has been utilized more for illicit message transmission, which is a source of concern. To make matters worse, adversaries are using steganalysis techniques to mess with the concealed data. In this article, we examine the different social media steganography techniques, such as those used on Facebook, WhatsApp, and Twitter, as well as the difficulties that these approaches raise. The positive and negative consequences of social media, as well as its current state, are discussed in this study. This paper discusses how the performances of Steganography methods may be assessed using the Entropy value of the Stego object. A look of the three features of steganography. It has been given with undetectability, robustness, and payload capacity. Finally, the paper's concept's future scope is explored.
引用
收藏
页码:153656 / 153665
页数:10
相关论文
共 35 条
[1]   Reference-free Detection of LSB Steganography Using Histogram Analysis [J].
Abdali, Natiq M. ;
Hussain, Zahir M. .
2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, :106-112
[2]   Applications of Artificial Intelligence in Transport: An Overview [J].
Abduljabbar, Rusul ;
Dia, Hussein ;
Liyanage, Sohani ;
Bagloee, Saeed Asadi .
SUSTAINABILITY, 2019, 11 (01)
[3]  
Benedict A.G., 2019, PROC ICDSC, P1
[4]  
Chang CY, 2014, COMPUT LINGUIST, V40, P403, DOI [10.1162/COLI_a_00176, 10.1162/coli_a_00176]
[5]  
DARBANI A, 2019, P KBEI FEB, P617
[6]  
Dhanush V, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), P324, DOI 10.1109/ICCMC.2017.8282701
[7]   What is AI? Applications of artificial intelligence to dermatology [J].
Du-Harpur, X. ;
Watt, F. M. ;
Luscombe, N. M. ;
Lynch, M. D. .
BRITISH JOURNAL OF DERMATOLOGY, 2020, 183 (03) :423-430
[8]  
Fang T, 2017, P ACL STUD RES WORKS, P100
[9]  
Grosvald M., 2011, Journal of Information Hiding and Multimedia Signal Processing, V2, P133
[10]   A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks [J].
Gurunath, R. ;
Alahmadi, Ahmed H. ;
Samanta, Debabrata ;
Khan, Mohammad Zubair ;
Alahmadi, Abdulrahman .
IEEE ACCESS, 2021, 9 (09) :120869-120879