Transmitting hidden information using steganography via Facebook

  • Nathaniel D. Amsden
  • , Lei Chen
  • , Xiaohui Yuan

Research output: Contribution to book or proceedingConference articlepeer-review

6 Scopus citations

Abstract

Social networking websites, specifically Facebook, offer means of reaching wide audiences to share information, including photos, documents, and videos. Social networks post potential critical threats to security and privacy, for example, using steganography to send covert information via Facebook photos. Experiments show that Facebook Cover Photos can effectively hide information to at least twenty percent capacity using Discrete Cosine Transform (DCT) coefficient embedding algorithms. JavaScript Facebook application-determined key security properties are desired in a practical steganography implementation, yet, the development of such security properties is missing. Based on our experimental results, we conclude that an automated, Facebook-integrated application is not desirable for these reasons and therefore manual interaction with Facebook should be used for steganography purposes.
Original languageEnglish
Title of host publication5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479926961
DOIs
StatePublished - Nov 19 2014
Event5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 - Hefei, China
Duration: Jul 11 2014Jul 13 2014

Publication series

Name5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014

Conference

Conference5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014
Country/TerritoryChina
CityHefei
Period07/11/1407/13/14

Scopus Subject Areas

  • Computer Networks and Communications

Keywords

  • Information Hiding
  • Social Media
  • Social Networks
  • Steganography

Fingerprint

Dive into the research topics of 'Transmitting hidden information using steganography via Facebook'. Together they form a unique fingerprint.

Cite this