4 research outputs found
Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
In the last decade, Social Networks (SNs) have deeply changed many aspects of
society, and one of the most widespread behaviours is the sharing of pictures.
However, malicious users often exploit shared pictures to create fake profiles
leading to the growth of cybercrime. Thus, keeping in mind this scenario,
authorship attribution and verification through image watermarking techniques
are becoming more and more important. In this paper, firstly, we investigate
how 13 most popular SNs treat the uploaded pictures, in order to identify a
possible implementation of image watermarking techniques by respective SNs.
Secondly, on these 13 SNs, we test the robustness of several image watermarking
algorithms. Finally, we verify whether a method based on the Photo-Response
Non-Uniformity (PRNU) technique can be successfully used as a watermarking
approach for authorship attribution and verification of pictures on SNs. The
proposed method is robust enough in spite of the fact that the pictures get
downgraded during the uploading process by SNs. The results of our analysis on
a real dataset of 8,400 pictures show that the proposed method is more
effective than other watermarking techniques and can help to address serious
questions about privacy and security on SNs.Comment: 43 pages, 6 figure
Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
In the last decade, Social Networks (SNs) have deeply changed many aspects of society, and one of the most widespread behaviours is the sharing of pictures. However, malicious users often exploit shared pictures to create fake profiles, leading to the growth of cybercrime. Thus, keeping in mind this scenario, authorship attribution and verification through image watermarking techniques are becoming more and more important. In this paper, we firstly investigate how thirteen of the most popular SNs treat uploaded pictures in order to identify a possible implementation of image watermarking techniques by respective SNs. Second, we test the robustness of several image watermarking algorithms on these thirteen SNs. Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. The proposed method is sufficiently robust, in spite of the fact that pictures are often downgraded during the process of uploading to the SNs. Moreover, in comparison to conventional watermarking methods the proposed method can successfully pass through different SNs, solving related problems such as profile linking and fake profile detection. The results of our analysis on a real dataset of 8400 pictures show that the proposed method is more effective than other watermarking techniques and can help to address serious questions about privacy and security on SNs. Moreover, the proposed method paves the way for the definition of multi-factor online authentication mechanisms based on robust digital features
Methods for Information Hiding in Open Social Networks
This paper summarizes research on methods for information hiding in Open Social Networks. The first contribution is the idea of StegHash, which is based on the use of hashtags in various open social networks to connect multimedia files (such as images, movies, songs) with embedded hidden data. The proof of concept was implemented and tested using a few social media services. The experiments confirmed the initial idea. Next, SocialStegDisc was designed as an application of the StegHash method by combining it with the theory of filesystems. SocialStegDisc provides the basic set of operations for files, such as creation, reading or deletion, by implementing the mechanism of a linked list. It establishes a new kind of mass-storage characterized by unlimited data space, but limited address space where the limitation is the number of the hashtags' unique permutations. The operations of the original StegHash method were optimized by trade-offs between the memory requirements and computation time. Features and limitations were identified and discussed. The proposed system broadens research on a completely new area of threats in social networks