238
Views
7
CrossRef citations to date
0
Altmetric
Articles

Steganography in Social Networks Based on Behavioral Correlation

ORCID Icon, &

References

  • Z. Wang, X. Zhang, and Z. Yin, “Joint cover-selection and payload-allocation by steganographic distortion optimiza- tion,” IEEE Signal Process Lett., Vol. 25, no. 10, pp. 1530–1534, Oct. 2018. doi: 10.1109/LSP.2018.2865888
  • S. Li, and X. Zhang, “Towards construction based data hiding: from Secrets to fingerprint images,” IEEE Trans. Image Processing, Vol. 28, no. 3, pp. 1482–1497, Mar. 2019. doi: 10.1109/TIP.2018.2878290
  • F. Li, K. Wu, J. Lei, M. Wen, Z. Bi, and C. Gu, “Steganalysis over large-scale social networks with high-order joint features and clustering ensembles,” IEEE Trans Inform. Forensics Secur., Vol. 11, no. 2, pp. 344–357, Feb. 2016. doi: 10.1109/TIFS.2015.2496910
  • T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inform Forensics Secur, Vol. 6, no. 3, pp. 920–935, Sept. 2011. doi: 10.1109/TIFS.2011.2134094
  • Z. Wang, X. Zhang, and Z. Yin, “Hybrid distortion function for JPEG steganography,” J. Electron. Imaging, Vol. 25, no. 5, pp. 050501, Sept. 2016. doi: 10.1117/1.JEI.25.5.050501
  • Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, “On improving distortion functions for JPEG steganography,” IEEE. Access., Vol. 6, no. 1, pp. 74917–74930, Dec. 2018. doi: 10.1109/ACCESS.2018.2884198
  • F. Li, X. Zhang, B. Chen, and G. Feng, “JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier,” IEEE Signal Process Lett., Vol. 20, no. 3, pp. 233–236, Mar. 2013. doi: 10.1109/LSP.2013.2240385
  • J. Fridrich, and J. Kodovsky, “Rich models for steganalysis of digital Images,” IEEE Trans. Inform. Forensics Secur., Vol. 7, no. 3, pp. 868–882, June 2012. doi: 10.1109/TIFS.2012.2190402
  • B. Li, Z. Li, S. Zhou, S. Tan, and X. Zhang, “New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator,” IEEE Trans. Inform. Forensics Secur., Vol. 13, no. 5, pp. 1242–1257, May, 2018. doi: 10.1109/TIFS.2017.2780805
  • J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inform. Forensics Secur., Vol. 7, no. 2, pp. 432–444, April 2012. doi: 10.1109/TIFS.2011.2175919
  • J. Ye, J. Ni, and Y. Yi, “Deep learning hierarchical representations for image steganalysis,” IEEE Trans. IEEE Trans. Inform. Forensics Secur., Vol. 12, no. 11, pp. 2545–2557, Nov. 2017. doi: 10.1109/TIFS.2017.2710946
  • J. Zeng, S. Tan, B. Li, and J. Huang, “Large-scale JPEG image steganalysis using hybrid deep-learning framework,” IEEE Trans. Inform. Forensics Secur., Vol. 13, no. 5, pp. 1200–1214, May 2018. doi: 10.1109/TIFS.2017.2779446
  • J. Tao, S. Li, X. Zhang, and Z. Wang, “Towards robust image steganography,” IEEE Trans. Circuits Syst Video Technol., Vol. 29, no. 2, pp. 594–600, Feb. 2019. doi: 10.1109/TCSVT.2018.2881118
  • N. Pantic, and M. Husain. “Covert botnet command and control using twitter,” in Proc. 31st Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA, USA, Dec. 2015, pp. 171–180.
  • S. Li, A. Ho, Z. Wang, and X. Zhang. “Lost in the digital wild: hiding information in digital activities,” in Proc. 2nd International Workshop on Multimedia Privacy and Security (MPS 2018), Toronto, Oct. 2018, pp. 27–37.
  • X. Zhang, “Behavior steganography in social network,” in Proc. the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, Nov. 2016, pp. 21–23.
  • J. Fridrich, and T. Filler. “Practical methods for minimizing embedding impact in steganography,” in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, Feb. 2007, pp. 2–3.
  • [Online]. Available: https://github.com/Chion82/WeChatMomentStat-Android

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.