Article information

2018 , Volume 23, ¹ 2, p.55-62

Nechta I.V.

A method of hidden messages embedding in graphlike structures of a social network

Purpose. This article addresses the construction of a new method for transmission of hidden messages in social networks. Methodology. The research employs methods of information theory, probability theory and mathematical statistics The Shannon entropy is used as the statistics for the analysis of an embedded message. Findings. The author proposed using the graphical structures of social networks as a container for the secret message transmission for the first time. As an example, the popular Vkontakte network is considered. The main idea of the method involves using the structure of the user’s friends graph to embed a secret message. Based on the available vertices (friends’ accounts), a complete graph is constructed, and its edges are enumerated. Each edge of the graph corresponds to one bit of the message being embedded: the bit is “1”, if the edge is present in the graph (one account in friends of the other), the bit is “0” if the edge is missing. To transfer the graph from one person to another, a key vertex is used. The specified vertex is connected by an edge with each connected component of the graph, which allows the graph to be transmitted using a single node and take into account all the vertices (including isolated ones). When retrieving a message, the key vertex and the edges connected to it are not considered. Conclusions. During the experimental research, it was shown that messages extracted from an empty container differ from the encrypted message by the probability distribution of bits. The necessity of adding redundancy to transmitted secret messages is shown with the purpose of “leveling” the statistical properties of an empty and filled container. The results of the experiment have showed that this method of steganography allows embedding a large amount of information into various social network structures represented in the form of a graph. It was noted in the paper that potentially “narrow” place of the algorithm is registration of new accounts. The restrictions imposed by the administration of some social networks for security purposes do not always allow automatic registration of new accounts, which makes the process of message embedding more difficult.

[full text]
Keywords: steganography, security in social networks, structural steganography

doi: 10.25743/ICT.2018.23.12758

Author(s):
Nechta Ivan Vasilievich
PhD. , Associate Professor
Position: Head of department
Office: Siberian state university of telecommunications and information sciences
Address: 630102, Russia, Novosibirsk
Phone Office: (383)269-83-59
E-mail: ivannechta@gmail.com
SPIN-code: 9054-8684

References:

[1] Simmons, G.J. The prisoners problem and the subliminal channel. Advances in Cryptology Proceedings of Crypto 83. Plenum Press; 1984:51–67.

[2] Kerckhoffs, A. La cryptographie militaire. Journal des sciences militaires. 1893; (9):5–83.

[3] Winstein, K. Tyrannosaurus lex 1999. Available at: http://web.mit.edu/keithw/tlex/ (accessed 11.12.2016).

[4] James, C. Steganography: Past, Present, Future. Available at:http://www.sans.org/reading_room/whitepapers/steganography/steganography_pas_present_future_552 (accessed 11.12.2016).

[5] Bennett, K. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University. CERIAS Tech. Report. 2004.

[6] Topkara, M. Natural language watermarking. Proceedings of SPIE International conference on Security, steganography, and watermarking of multimedia contents. 2005:441–452.

[7] Chapman, M., Davida, G. Hiding the hidden: A software system for concealing cipher text in innocuous text. Proceedings of the International Conference on Information and Communications Security. Lecture Notes in Computer Sciences. 1997; (1334):333–345.

[8] Engel, P. ISIS has figured out ways to get around restrictions on one of the main apps it uses for propaganda Available at: http://www.businessinsider.com/isis-telegram-channels-2015-11 (accessed 11.12.2016).

[9] Guha S., Tang K., Francis, P. NOYB: Privacy in online social networks. Proceedings of the first workshop on Online social networks. ACM, 2008: 49–54.

[10] Collberg, C.S., Thomborson, C. Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on software engineering. 2002; 28(8):735–746.

[11] Shannon, C. E. A mathematical theory of communication. Bell System Technical Journal. 1948; 27(3):379–423.

[12] Nechta, I.V. Method of secret messages embedding into executable files. Vestnik SibGUTI. 2011; (2):3–10. (In Russ.)


Bibliography link:
Nechta I.V. A method of hidden messages embedding in graphlike structures of a social network // Computational technologies. 2018. V. 23. ¹ 2. P. 55-62
Home| Scope| Editorial Board| Content| Search| Subscription| Rules| Contacts
ISSN 1560-7534
© 2024 FRC ICT