Anda di halaman 1dari 6

Steganography and Secure Communication on

Online Social Networks and Online Photo Sharing


Aniello Castiglione

, Bonaventura DAlessio

, Alfredo De Santis

Dipartimento di Informatica R.M. Capocelli


Universit degli Studi di Salerno
I-84084 Fisciano (SA), Italy
castiglione@ieee.org

, bdalessio@dia.unisa.it

, ads@dia.unisa.it

AbstractOn the in Internet today, there are numerous web-


sites offering places to store and share images (photos, drawings,
cliparts, etc.). Online Social Networks (OSN) and Online Photo
Services (OPS) usually offer this type of service making it
possible to upload and manage the images they publish. Users can
publish their own images as well as add descriptions and tags.
By adjusting the personal privacy settings, the images become
visible only to authorized users, with it then being possible
to add any comments. Generally, OSN/OPS manipulate the
published images by resizing, upgrading metadata, compressing,
embedding watermarking, and making it difcult to use well-
known steganographic techniques on them.
In this paper two new steganographic schemes that mainly
take advantage of the published images and survive the OSN/OPS
processing before their publication, are proposed and analyzed.
Finally, a notication system which uses tags to manage the
sent/received information on the secret channel is proposed. This
allows for the deletion of the received information as well as a
bandwidth increase of the secret channel.
Index TermsSteganography, Online Social Network, Online
Photo Sharing, OSN, OPS, Secure Channel, Covert Channel,
Image Metadata.
I. INTRODUCTION
A social network is an association of people drawn
together by family, work or hobby. This term was rst coined
in 1954 by J. A. Barnes [1]. Thus, a social network is a social
structure made up of individuals (or organizations) called
nodes, which are tied (connected) by one or more specic
types of interdependency, such as friendship, kinship, common
interests, nancial exchanges, dislikes, sexual relationships,
as well as relationships of beliefs, knowledge or prestige.
The virtualization of the concept, i.e., when the relationship
between players takes place on the Web, is called Online
Social Network [2]. In order for an OSN to work on the
Internet, it requires an online service, platform, or site that
focuses on the building and reecting of the Social Network
Sites. A denition of Social Network Sites, proposed in [3], is
the following: We dene social network sites as web-based
services that allow individuals to: construct a public or semi-
public prole within a bounded system, articulate a list of other
users with whom they share a connection, view and traverse
their list of connections and those made by others within the
system.
Corresponding author: Aniello Castiglione, Member, IEEE, cas-
tiglione@ieee.org, Phone: +39089969594, FAX: +39089969821
An OSN is based on the representation of the users, via
a prole consisting of a set of attributes which describes it,
the social links as well as some additional services. These
web-based services allow users to interact via the Internet
and include e-mail, instant messaging as well as data sharing
(e.g., ideas, activities, events, interests, images, etc.). The main
service offered by the OSNs is the creation of a relationship
among users sharing common interests such as hobbies, poli-
tics, sports, and religion.
A common service offered by OSN is related to images.
In general, images can be uploaded, organized in albums and
may contain tags of other users. This creates a link to another
member of the OSN who is tagged in the image. The tagging
operations are generally notied to the users involved. Another
feature which is very common on both OSN and OPS is the
possibility to add some keywords to each published image.
The most popular OSNs in the world are without a doubt
Twitter and Facebook. However, there are other OSNs which
are prevalent in specic geographic areas. For example, MyS-
pace and LinkedIn are popular in North America, Orkut
and Hi5 in South America and Central America, Nexopia
in Canada, Tuenti in Spain, StudiVZ in Germany, iWiW in
Hungary, and Nasza-Klasa in Poland.
An Online Photo Sharing (OPS) web-site makes it possible
to publish online digital images, essentially photos. This
functionality is provided through applications that ease the
upload, visualization and management of the images. Table I
shows a comparison of some OPS web-services [4]. In the
table, there is:
the name of the site;
the image le format accepted during the upload;
the possibility to create and manage albums and directo-
ries;
the space limits for each user;
if it allows to tag images or to use keywords;
if it allows to insert comments;
the approximate number of registered user.
Generally, OSN as well as OPS apply some processing
to the images before their publication, for example by
resizing, renaming, compressing, etc.. A characterization
of the processing performed by some OSN/OPS has been
presented in [5]. Facebook resizes the images to a resolution
2011 International Conference on Broadband and Wireless Computing, Communication and Applications
978-0-7695-4532-5/11 $26.00 2011 IEEE
DOI 10.1109/BWCCA.2011.60
363
of 720 pixel or 2048 for high resolution images, and renames
them with a string containing, among other things, the
Facebook numeric user-id as well as the sequence-number
of the photo. The two resolutions, 720 pixel and 2048, are
referred to the bigger side of the images. Facebook, when
resizing, scales the bigger side of an image to one of the
two resolutions and modies the other side keeping the
original aspect ratio of the image. On the contrary, Picasa, the
OPS developed by Google, does not perform any processing
neither in the resolution nor compression of the published
images. In fact, when submitting images at the one resolution
managed by Picasa, i.e., original resolution, 1600, 1200
or 640 pixel (on the bigger side) the images are left unchanged.
Table I
A COMPARISON OF SOME OPS WEB-SITES
Name Format Album Limit Tags Com. Users
Flickr JPEG Yes 3GB Yes Some 26, 000, 000
Fotki GIF
JPEG
PNG
Yes 50MB Yes Yes 1, 250, 000
Picasa GIF
JPEG
PNG
Yes 1GB Yes Some 500, 000
Shuttery JPEG Yes unlimit No Some 2, 000, 000
SmugMug JPEG
TIFF
PNG
GIF
No unlimit Yes Yes 315, 000
Snapsh JPEG No unlimit No 70, 000, 000
Webshots JPEG No 2GB Yes Some 32, 000, 000
Windows
LivePho-
tos
JPEG Yes 25GB Yes Some 56, 000, 000
Zooomr JPEG
TIFF
PNG
GIF
Yes unlimit Yes Yes 100, 000
This paper proposes and analyzes two new steganographic
techniques to hide information. The rst technique uses the
le name of the images as generated by a digital camera. The
second one takes advantage of the feature of inserting tags in
images. Finally, this paper proposes a technique to establish
a secure communication channel among users exploiting
the OSN/OPS involved. The tags are used to construct a
notication system which allows users to announce having
sent a new secret message as well as acknowledge it having
been received.
The paper is structured as follows. Section II gives a classi-
cation of Information Hiding. In Section III the technique
of hiding data by using the le name of the published
images is described. In Section IV the second steganographic
technique, which uses the tags to hide information in a
OSN/OPS is presented. Section V illustrates how to create a
secure communication channel, by adding to the two proposed
steganographic schemes a notication system based on tags.
Some concluding remarks are given in Section VI.
II. INFORMATION HIDING
Information Hiding is a eld of Information Security. This
term refers to several techniques used to hide information in
different types of digital containers (transmission channels,
documents, audio, video, programs, images, etc). The reasons
for hiding information can be different, for example, to store
secret messages in a secure way or create covert channels. A
covert channel is a communication channel that violates the
system security policy, as dened in [6] by Lampson, Covert
channels, i.e. those not intended for information transfer at all,
such as the service programs effect on the system load.
Figure 1 shows the classication of Information Hiding
adapted from Bauer [7].
/ ,
^
>

^
s
^
d
^
K
:

'


Z

& t
/

&

Figure 1. Classication of Information Hiding adapted from Bauer.


An important area of the Information Hiding is Steganog-
raphy. While Cryptography studies how to protect the content
of a message, Steganography deals with the techniques used
to hide the existence of a message.
It is also possible to implement steganographic techniques
on OSN/OPS. The simplest one is to divide the secret message
into pieces that are added as comments to photos. How-
ever, since it usually publishes textual information (such as
comments, photo descriptions, etc.), Linguistic steganography
techniques can be used. Linguistic steganography is a tech-
nique in which the message is concealed in the carrier not
using obvious methods.
It uses the following techniques:
Visual Semagram, where innocent-looking or everyday
physical objects hide the message (e.g., positions of
elements in a published image);
Text Semagram, where the message is hidden taking
advantage of the ways of visualizing the data (e.g., uses
the addition of extra spaces in the eld description);
Jargon code, which uses a language understood by a
limited group of people (e.g., innocent comments that
364
hide special meanings that have sense only for the inter-
locutors);
Covered Grille cipher, where a template is applied to the
carrier message; in this way only the characters which
compose the secret message are visible while the others
are obfuscated;
Covered Null cipher, where the message is hidden using
a set of rules agreed upon by the users (e.g., see the rst
character of every word or read every ve words).
The technique analyzed in Section III can be classied as
Covered Null cipher, while the one shown in Section IV can
be classied as Visual Semagram.
III. STEGANOGRAPHY IN THE FILE NAME
User images are usually processed by the OSN/OPS before
their publication. The processing may vary depending on the
service, and usually involves some other characteristics of
the images, such as image format, size, metadata, quality
factor, etc. (see for example [5]). While the OSN usually
perform some modications on the le name of the published
images, the OPS usually leave it unchanged. Therefore, a
published image on a OSN/OPS with a le name following
the common encoding rules assigned automatically from the
digital cameras, does not raise suspicion. In this section the
authors focus their attention on digital photos rather than
considering general images. The key idea is to embed the
secret message into a sequence of le names that follow
the naming convention adopted by the digital cameras when
saving the captured photos.
The digital photos are raster images (bitmap images) charac-
terized by resolution (in pixel), number of bits used to describe
the color and compression format. Digital cameras usually
generate photos in the JPEG format with an assigned name
which is usually compliant with a particular naming conven-
tion. Furthermore, the le size of digital photos depends on
the camera model, internal le size, compression settings and
user-selected resolution. Thus, the number of images that can
be saved in a storage device (e.g., a microSD) depends on the
above-mentioned variables. The le name is created according
to a naming convention which, although being different and
depending on the brand, has as a common feature, its length
which is eight characters (xxxxxxxx) followed by a dot and
an extension (yyy) which results in xxxxxxx.yyy. Generally,
the extension is JPG and the name is composed of:
a rst part of alphabetic characters;
an eventual _;
a few digits that identify the sequence number of the
photos.
Table II illustrates the naming convention adopted by some
well-known brands. Occasionally, a brand uses the same
naming convention to refer to different digital camera models.
The proposed technique uses the variable part of the photo
le name to hold secret information. For example, as shown
Table II
EXAMPLE OF COMMON NAMING CONVENTION AMONG DIGITAL CAMERAS
Brand Naming convention File type
Canon IMG_xxxx.JPG JPEG
Canon (reex) iMG_xxxx RAW
Panasonic, Sony, Nikon DSC_xxxx.JPG JPEG
Panasonic Pxxxxxxx.JPG JPEG
Casio CIMGxxxx.JPG JPEG
Fujilm DSCFxxxx.JPG JPEG
Leica L1001xxx.JPG JPEG
Olympus P305xxxx.JPG JPEG
Pentax IMGPxxxx.JPG JPEG
Samsung SNCxxxxx.JPG JPEG
Sigma SDIMxxxx.JPG JPEG
in Table II, the maximum length of the variable part of each
le name is seven digits for Panasonic. If the information to
hide is longer than the number of digits k (with k < 7) of the
variable part of the photo le name, then it is necessary to use
several photos and properly distribute the information content
in the variable parts. If there are t photos generated by the
same camera model and with the same le naming, than there
are k t decimal digits useful to encode the message. These
correspond to log
2
10
kt
3.32 k t bits. The value t can be
large and depends on the policy of the service (for example,
for some OPS, see Table I) as well as the processing applied
before publishing.
Since the secret message is fragmented into several parts,
it is important for its subsequent reconstruction to establish
their correct order. Before describing techniques to establish
the order of the fragments, it is necessary to introduce some
notation.
Let P
1
, P
2
, , P
m
be the sequence of photos in which
the secret message will be embedded, as they appear on the
OSN/OPS. Let S = s
1
||s
2
|| ||s
m
be the stego-data which
is the concatenation of m pieces s
i
of size k bits, where only
the last piece, s
m
, is of size k.
A permutation is chosen to establish where to embed
each fragment. Specically, fragment s
(i)
is inserted in the
le name of the photo P
i
. In the following, the (i) is referred
to as the fragment index. In order to extract the stego-data
from the sequence of photos P
1
, P
2
, , P
m
, the recipient
has to compute the inverse permutation
1
. If f
i
is the
fragment extracted from the le name of the photo P
i
, then
the stego-data is retrieved as f

1
(1)
||f

1
(2)
|| ||f

1
(m)
,
which recovers the value of the embedded stego-data S.
There are different ways to x the permutation and, thus,
to establish the order of the fragments:
The permutation can be xed a priori; for example it can
be the identity permutation (i.e., (i) = i), or the reverse
order permutation (i.e., (i) = mi + 1).
The permutation can depend on the sequence of les
P
1
, P
2
, , P
m
; for example the hash values of the
involved photos can be computed and dene the permu-
tation according to the lexicographic order of those hash
values, namely, (i) is equal to the index corresponding
365
to the i-th smaller value in the set of computed hashes
H(P
1
), H(P
2
), , H(P
n
). If H(P
j
) is the i-th smaller
value in this set, then (i) = j.
The permutation can also depend on other information
published on the OSN/OPS. For example, another pub-
lished photo P can be xed and used as a seed in a
Pseudo-Random Number Generator (PRNG) to produce
a sequence PRNG(P) = g
1
||g
2
|| ||g
m
of m values of
a suitable length. The permutation is dened according
to the lexicographic order of values g
1
, g
2
, , g
m
, that
is, (i) is equal to the index corresponding to the i-th
smaller value among them. If g
j
is the i-th smaller value
in this set, then (i) = j.
Finally, the permutation can depend both on the sequence
of photos P
1
, P
2
, , P
m
as well as other published
photos on the OSN/OPS. For example, the output of
the PRNG can be given as the input, together with the
photo P
i
to the hash function. In other words, the m
values g
1
, g
2
, , g
m
, output of the PRNG seeded with
an external photo P, can be concatenated pair-wise to the
sequence of photos P
1
, P
2
, , P
m
in order to obtain the
resulting g
1
||P
1
, g
2
||P
2
, , g
m
||P
m
. The permutation is
dened according to the lexicographic order of values
g
1
||P
1
, g
2
||P
2
, , g
m
||P
m
, that is, (i) is equal to the
index corresponding to the i-th smaller value among
them.
If parties share a private key, the permutation order can also
depend on it. For example, an HMAC can be used instead of
hash values.
It is clear that for some of the methods described above,
in which the permutation is dened on objects published on
the OSN, these objects have not to change after publication
since it could compromise the revealing process of the stego-
system. If the changes cannot be avoided due to OSN/OPS
functionalities, then other methods have to be used to dene
the order of the fragments. The order information has to be
independent from the object and may be either xed a priori
or included in the information published by the OSN/OPS.
For example, it can be included as part of the le name of the
photos. This approach clearly decreases the total information
carried by the stego-system. If k digits were available in the
le name for the stego-data, then q of them can be used
as an index and the remaining k q to embed fragments.
It is also possible to include the order information in the
EXIF [9] metadata of the photos, as a comment or a keyword
of the published photos, as long as this information is not
modied before publication and is not subject to changes
after publication by the OSN/OPS.
Some OSNs, such as Facebook, do not preserve the original
le name but rename it with a new one which contains several
pieces of information such as the Facebook identier. In
these cases, the proposed technique cannot be directly used
due to the hidden data being deleted when the images are
published on the OSN/OPS. This problem can be overcome by
storing the original le name in other elds which are usually
present in most of the OSN/OPS. In the case of Facebook,
for example, the Description eld can be used to store
the original le name and hence adopt the proposed technique.
Stego-data does not have not to be embedded into all the
photos belonging to a user, with it being possible to use only
a subset. The remaining photos, as well as the respective
le names, can be used to further obfuscate and hide the
presence of the stego-system. It is therefore important to
establish which are the photos to be used in order to embed
the fragments.
It is possible to use an approach similar to the one adopted in
the determination of the permutation illustrated above. Let
P
1
, P
2
, , P
n
be the sequence of all the images published
by a user as they appear on the OSN/OPS. A characteristic
binary vector c
1
, c
2
, , c
n
is chosen to establish which
photo should be part of the sequence used for the embedding
procedure. That is, c
i
= 1 implies that the photo P
i
is part of
the sequence, while c
i
= 0 tells that the photo P
i
should not
be considered. Therefore, the initial sequence of the photos
is P
i1
, P
i2
, , P
im
where 1 i
1
< i
2
< < i
m
n and
c
i1
= c
i2
= = c
in
= 1 and the other c
j
values are equal
to zero.
Similarly to the determination of the permutation , there
are different ways to x the characteristic binary vector:
It can be xed a priori. For example, it can be a part of
the binary expansion of or the outcome of the Lottery.
It can vary with the sequence of photos. For example, it
can be the concatenation of the hash values of the rst
few photos.
It can also depend on other information published on the
OSN/OPS. For example, it can be the output of a PRNG
seeded with a priori xed photo.
Finally, it can depend both on the sequence of photos
P
1
, P
2
, , P
n
as well as an additional photo P
published on the OSN/OPS. For example, the PRNG
can be seeded with the photo P and then its output can
be XORed piece-wise with the hash values computed on
the rst few photos.
Another possibility offered by the OSN/OPS is the grouping
and organization of photos in folders whose name is usually
left to the user choice. This makes it possible to use the
folder le names to hide parts of the stego-data.
In order to improve the efciency of the entire system, it
is advisable to compress the stego-data before embedding it.
For example, the Deate algorithm [8] can be used.
Since the stego-data can be discovered, an encryption algo-
rithm (either symmetric or asymmetric) should be used before
embedding it. This increases the entropy and makes it more
difcult to detect the existence of the stego-data.
366
Time Consistency
The EXIF (Exchangeable Image File Format) standard [9]
is used to associate metadata to the image. Among the
information supplied by the EXIF standard, in this subsection
the attention is focused on the time and date. Such information
allows for the reconstruction of the temporal sequence of all
the photos, assuming that the time and date were correctly
set on the digital camera and that nobody has manually
modied them later. The order established by the sequence
number contained in the le name has to be coherent with
the temporal sequence of the creation time contained in the
EXIF metadata. To avoid inconsistency, it is necessary to
avoid or limit anomalies between the two temporal sequences.
Therefore, if the fragment index does not depend on the
photos containing the stego-data, then the le name should
be bound to the images in such a way as to preserve this
relationship.
Another possibility is to remove the EXIF metadata from
the images before uploading them to a OSN/OPS. It is worth
mentioning that this operation is usually performed by most
of the OSNs while, on the contrary, most of the OPSs leave
the EXIF metadata unchanged.
Photos produced with a given digital camera and shot in a
short time interval, have a relatively close sequence number
in the le names. Vice versa, a large difference in sequence
numbers in le names usually corresponds to photos shot
over longer time interval. To avoid anomalies with respect
to the above mentioned property, a smaller value of k can
be used by xing the rst few digits of the le name and
using the remaining digits of the le names to hold fragments.
IV. STEGANOGRAPHY USING TAGS
In this section a new steganography technique that takes
advantage of the use of tags is proposed. The tag, whose
circulation has increased with the advent of the Web 2.0, is
a metadata that links different elements. Tagging is very
popular in OSN/OPS, where the terminology refers to the
specic case where a user identies the people depicted
in a photo, and marks the photo with their names, thus,
explicitly linking those people to the photo [3]. The proposed
steganographic technique uses a set of photos posted by a
user on an OSN/OPS and the tags on them in order to encode
a secret message. The technique applies also to general
images and is not limited to photos.
Assume a user u has posted t photos on an OSN/OPS. Let
P
1
, P
2
, , P
t
be the sequence of published photos which
is the part of all users photos that will be used to embed
the stego-text. In addition, let U be the sequence of users
u
1
, u
2
, , u
m
who can be tagged in the photos in order to
hide the information. Therefore, in every photo P
i
, u can add
or not a tag to one of the m users u
j
. This makes it possible
to construct a matrix where the element b
j,i
will be:
1, if in the photo P
i
the user u
j
has been tagged;
0, if in the photo P
i
the user u
j
has not been tagged.
Table III
BINARY ENCODING OF THE TEST SECRET MESSAGE
t h i s
01110100 01101000 01101001 01110011 01000000
m e s s a
01101101 01100101 01110011 01110011 01100001
g e i s
01100111 01100101 01000000 01101001 01110011
h i d d
01000000 01101000 01101001 01100100 01100100
e n
01100101 01101110
The sequence of m t bits b
1,1
b
1,2
b
m,t
will encode
the secret message.
Table IV
SEQUENCE OF BITS b
j,i
IN MATRIX REPRESENTATION
Photos
P
1
P
2
P
3
P
4
P
5
P
6
P
7
P
8
P
9
P
10
P
11
u
1
0 1 1 1 0 1 0 0 0 1 1
u
2
0 1 0 0 0 0 1 1 0 1 0
u
3
0 1 0 1 1 1 0 0 1 1 0
u
4
1 0 0 0 0 0 0 0 1 1 0
u
5
1 1 0 1 0 1 1 0 0 1 0
u
6
1 0 1 1 1 0 0 1 1 0 1
u
7
1 1 0 0 1 1 0 1 1 0 0
u
8
0 0 1 0 1 1 0 0 1 1 1
u
9
0 1 1 0 0 1 0 1 0 1 0
u
10
0 0 0 0 0 0 1 1 0 1 0
u
11
0 1 0 1 1 1 0 0 1 1 0
u
12
1 0 0 0 0 0 0 0 1 1 0
u
13
1 0 0 0 0 1 1 0 1 0 0
u
14
1 0 1 1 0 0 1 0 0 0 1
u
15
1 0 0 1 0 0 0 1 1 0 0
u
16
1 0 1 0 1 1 0 1 1 1 0
Clearly, in order to increase the size of the secret message,
in addition to posting more photos, it is also possible to
increase the cardinality of U. To do this, u can create
ctitious users in the OSN/OPS, who will link to his prole,
inserting them into the sequence U. Using the privacy
settings, available on several OSN/OPS, it may be possible to
increase the degree of condentiality of the message due to
the sharing of photos, albums and notication of tags being
limited to small groups of users and not visible to everyone.
The privacy settings should be congured in such a way as
to allow the receiver of the secret message to see all photos
in the sequence as well as the tags applied.
The described technique has two aspects for improvement
compared to the one discussed in Section III. The rst is
the amount of hidden information that, on the basis of the
number of images available on the OSN/OPS, is higher due
to it using a system that exploits a number of tagged users
which is greater than the number of bits in the le name
that can be used to embed the stego-data. The second is
the time required to hide the message. With the technique
described in Section III, having to rename the images
367
published generally requires uploading them again. This can
be a rather time consuming process, depending on the size
of the les. While the time taken to hide information using
the technique discussed in this section is relatively quick due
to it adding the appropriate tags to images that have already
been published.
As an example, consider the case where the message this
message is hidden is the one to be hidden. The text
consists of 22 characters, and since each character is ASCII
encoded with a byte, 176 bits are needed to represent the
message (see Table III).
Assuming one has 11 photos and 16 users to tag in each
photo, than the entire message of 176 = 11 16 bits can be
encoded. The sequence of bits b
j,i
, represented as a matrix,
is the one reported in Table IV. Therefore, in photo P
1
users
u
4
, u
5
, u
6
, u
7
, u
12
, u
13
, u
14
, u
15
and u
16
have to be tagged,
in photo P
2
users u
1
, u
2
, u
3
, u
5
, u
7
, u
9
and u
11
have to be
tagged and so on, up to photo P
11
where users u
1
, u
6
, u
8
,
and u
14
have to be tagged.
Clearly, in order to improve efciency and security it
is advisable to compress and encrypt the stego-data before
embedding it.
V. SECURE COMMUNICATION ON OSN AND OPS
The solution introduced in this section aims to establish
secure communication paths among users of a OSN/OPS.
Using the proposed solution, it is possible to transmit
information in a secure way and hide it with respect to a
limited number of users in a selective manner. The idea is to
apply the techniques described in Section III and IV to hide
data, as well as implement a notication mechanism which
noties when a secret message has been read and by who.
The notication system proposed in this section uses the tags
on the photos present on OSN/OPS. Even in this case, one
can perform the tag operation even to other kind of images
besides photos.
After having concealed the message, the sender applies the
tag related to the receivers of the message to one photo
stored in the albums which has to be different from the photos
used in the above-mentioned steganographic technique of
Section IV. Then, the OSN/OPS will notify to the users who
have been tagged in that photo. Thus, they will discover
that a hidden piece of information directed to them has
been published. After reading the message, the users will
remove the tag inserted by the sender. In this way, the sender,
monitoring who has removed the tag from the photo, will
known who has received and read the secret message.
How the proposed notication system works will now
be described in further detail. To post a hidden message, a
generic user u will use the techniques described in Section III
and IV. Having published the message, u should notify its
publication to a set of users U

, the recipients of the secret


message. In order to do this, the sender simply tags in the
photo P, all the users of U

. The OSN/OPS will notify the


users of U

that they have been tagged in the photo P of


u: this will be interpreted as the release of a secret message
from the user u. In turn, the users of U

, having decoded
the hidden data, removed the tag from P, thus notifying u
that the secret message has been read. Then, new message
can be sent. In this way it is established a synchronous
communication channel.
In order to make it more difcult to intercept secure
communications, as well as increase the amount of
information transmitted, the system may be distributed
across multiple sites. Using the privacy settings, available
on several OSN/OPS, it may be possible to increase the
degree of condentiality of the message due to the sharing of
photos, albums and notication of tags being limited to small
groups of users and not necessarily everyone.
VI. CONCLUSIONS
New techniques to create a secure communication on the
Internet have been presented in this paper. The most important
elements in implementing these techniques are the availability
of photos, published and shared on the Web, as well as
the ability to create tags on the other users. The amount
of information that can be hidden depends on the number
of photos published, the numbers of users to involve, the
name assigned to them as well as how they are distributed in
various albums. A notication system which uses tags has been
proposed to implement a secure synchronous communication
channel.
Since most of the OSN/OPS change the published photos,
it is not possible to use classic steganographic techniques
directly on these images. Thus, the proposed steganographic
technique may be very useful to create a covert channel even
on OSN/OPS that notoriously modify the multimedia les
before publication.
REFERENCES
[1] J. Barnes, Human relations, Class and Committees in a Norwegian
Island Parish, vol. 7, pp. 3958, 1954.
[2] S. Grabner-Krauter, Web 2.0 social networks: The role of trust, Journal
of Business Ethics, vol. 90, pp. 505522, December 2009.
[3] D. M. Boyd and N. B. Ellison, Social network sites: Denition, history,
and scholarship, Journal of Computer-Mediated Communication, vol. 13,
no. 1, pp. 210230, 2007.
[4] Wikipedia, List of photo sharing websites, http://en.wikipedia.org/wiki/
List_of_photo_sharing_websites, visited June 2011.
[5] A. Castiglione, G. Cattaneo, and A. De Santis, A forensic analysis of
images on online social networks, Submitted, June 2011.
[6] B. W. Lampson, A note on the connement problem, Commun. ACM,
vol. 16, pp. 613615, October 1973.
[7] F. L. Bauer, Decrypted secrets - methods and maxims of cryptology (4.
ed.). Springer, 2007.
[8] P. Deutsch, Deate compressed data format specication version 1.3,
http://www.ietf.org/rfc/rfc1951.txt, May 1996.
[9] Camera & Imaging Products Association, Standardization Committee,
Exchangeable image le format for digital still cameras: Exif Version
2.3, http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008-2010_E.
pdf, 26 April 2010.
368

Anda mungkin juga menyukai