Social Media and Steganography: Use, Risks and Current Status

Steganography or data hiding is used to protect the privacy of information in the transit; it has been observed that the information that flows through Online Social Networks (OSN) is very much unsafe. Therefore, people hesitate to communicate their sensitive data on social media.. Most of the infor...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: R. Gurunath, Mohammad Fadel Jamil Klaib, Debabrata Samanta, Mohammad Zubair Khan
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
OSN
Acceso en línea:https://doaj.org/article/aa7900b11c8c4c58844895fe61fff062
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:aa7900b11c8c4c58844895fe61fff062
record_format dspace
spelling oai:doaj.org-article:aa7900b11c8c4c58844895fe61fff0622021-11-24T00:03:13ZSocial Media and Steganography: Use, Risks and Current Status2169-353610.1109/ACCESS.2021.3125128https://doaj.org/article/aa7900b11c8c4c58844895fe61fff0622021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9599677/https://doaj.org/toc/2169-3536Steganography or data hiding is used to protect the privacy of information in the transit; it has been observed that the information that flows through Online Social Networks (OSN) is very much unsafe. Therefore, people hesitate to communicate their sensitive data on social media.. Most of the information on the online social network is not useful to users and appears to disregard such details. People’s actions provided a possibility for digital Steganography through the Internet.. TCPIP covert channels were used for steganography until the last decade. People began to utilize social media as a covert conduit to communicate hidden messages to targeted users as social media grew in popularity. There are numerous Online Social Networks accessible nowadays, ranging from Facebook to the more contemporary Twitter and Instagram. All of them may be utilized as covert channels without the general public noticing. The primary characteristic of steganography is the protection of information privacy; nonetheless, it has been utilized more for illicit message transmission, which is a source of concern. To make matters worse, adversaries are using steganalysis techniques to mess with the concealed data. In this article, we examine the different social media steganography techniques, such as those used on Facebook, WhatsApp, and Twitter, as well as the difficulties that these approaches raise. The positive and negative consequences of social media, as well as its current state, are discussed in this study. This paper discusses how the performances of Steganography methods may be assessed using the Entropy value of the Stego object. A look of the three features of steganography. It has been given with undetectability, robustness, and payload capacity. Finally, the paper’s concept’s future scope is explored.R. GurunathMohammad Fadel Jamil KlaibDebabrata SamantaMohammad Zubair KhanIEEEarticleSteganographysocial mediacyber stalkingcyber bullyingsteganalysisOSNElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 153656-153665 (2021)
institution DOAJ
collection DOAJ
language EN
topic Steganography
social media
cyber stalking
cyber bullying
steganalysis
OSN
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Steganography
social media
cyber stalking
cyber bullying
steganalysis
OSN
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
R. Gurunath
Mohammad Fadel Jamil Klaib
Debabrata Samanta
Mohammad Zubair Khan
Social Media and Steganography: Use, Risks and Current Status
description Steganography or data hiding is used to protect the privacy of information in the transit; it has been observed that the information that flows through Online Social Networks (OSN) is very much unsafe. Therefore, people hesitate to communicate their sensitive data on social media.. Most of the information on the online social network is not useful to users and appears to disregard such details. People’s actions provided a possibility for digital Steganography through the Internet.. TCPIP covert channels were used for steganography until the last decade. People began to utilize social media as a covert conduit to communicate hidden messages to targeted users as social media grew in popularity. There are numerous Online Social Networks accessible nowadays, ranging from Facebook to the more contemporary Twitter and Instagram. All of them may be utilized as covert channels without the general public noticing. The primary characteristic of steganography is the protection of information privacy; nonetheless, it has been utilized more for illicit message transmission, which is a source of concern. To make matters worse, adversaries are using steganalysis techniques to mess with the concealed data. In this article, we examine the different social media steganography techniques, such as those used on Facebook, WhatsApp, and Twitter, as well as the difficulties that these approaches raise. The positive and negative consequences of social media, as well as its current state, are discussed in this study. This paper discusses how the performances of Steganography methods may be assessed using the Entropy value of the Stego object. A look of the three features of steganography. It has been given with undetectability, robustness, and payload capacity. Finally, the paper’s concept’s future scope is explored.
format article
author R. Gurunath
Mohammad Fadel Jamil Klaib
Debabrata Samanta
Mohammad Zubair Khan
author_facet R. Gurunath
Mohammad Fadel Jamil Klaib
Debabrata Samanta
Mohammad Zubair Khan
author_sort R. Gurunath
title Social Media and Steganography: Use, Risks and Current Status
title_short Social Media and Steganography: Use, Risks and Current Status
title_full Social Media and Steganography: Use, Risks and Current Status
title_fullStr Social Media and Steganography: Use, Risks and Current Status
title_full_unstemmed Social Media and Steganography: Use, Risks and Current Status
title_sort social media and steganography: use, risks and current status
publisher IEEE
publishDate 2021
url https://doaj.org/article/aa7900b11c8c4c58844895fe61fff062
work_keys_str_mv AT rgurunath socialmediaandsteganographyuserisksandcurrentstatus
AT mohammadfadeljamilklaib socialmediaandsteganographyuserisksandcurrentstatus
AT debabratasamanta socialmediaandsteganographyuserisksandcurrentstatus
AT mohammadzubairkhan socialmediaandsteganographyuserisksandcurrentstatus
_version_ 1718416113660854272