Pictographic steganography based on social networking websites

Feno Heriniaina RABEVOHITRA, Xiaofeng Liao


Steganography is the art of communication that does not let a third party know that the communication channel exists. It has always been influenced by the way people communicate and with the explosion of social networking websites, it is likely that these will be used as channels to cover the very existence of communication between different entities. In this paper, we present a new effective pictographic steganographic channel. We make use of the huge amount of photos available online as communication channels. We are exploiting the ubiquitousness of those social networking platforms to propel a powerful and pragmatic protocol. Our novel scheme exploiting social networking websites is robust against active and malicious.


Information hiding; steganography; online social networking; pictogram

Full Text:



Myres, John Linton. Herodotus, father of history. Clarendon Press, 1953.

Waterfield, Robin, and C. Dewald. "Herodotus: The Histories." Herodotus:(translation (1998).

Sumathi, C. P., T. Santanam, and G. Umamaheswari. "A Study of Various Steganographic Techniques Used for Information Hiding." arXiv preprint arXiv:1401.5561 (2014).

Kawaguchi, Eiji, and Richard O. Eason. "Principles and applications of BPCS steganography." Photonics East (ISAM, VVDC, IEMB). International Society for Optics and Photonics, 1999.

Anderson, Ross J., and Fabien AP Petitcolas. "On the limits of steganography." Selected Areas in Communications, IEEE Journal on 16.4 (1998): 474-481.

Westfeld, Andreas, and Andreas Pfitzmann. "Attacks on steganographic systems." Information Hiding. Springer Berlin Heidelberg, 2000. APA

Provos, Niels. "Defending Against Statistical Steganalysis." Usenix security symposium. Vol. 10. 2001.

Facebook Help Center. 2015. Basic Privacy Settings & Tools. Retrieved April 12, 2015 from https://www.facebook.com/help/325807937506242/

Özera Hamza, Avcıba Ismail, Sankura Bülent and Memonc Nasir. 2010. Steganalysis of Audio based on Audio Quality Metrics.

Fridrich J. 2009. Steganography in digital media principles algorithms and applications. 1st Ed. Campbridge University Press.

Johnson N.F and Jajodia S. 1998. Exploring steganography: seeing the unseen. IEEE Computer, (pp. 26-34).

Srivastava, Lee A. B., Simoncelli E. P. and Zhu S-C. 2003. On Advances in Statistical Modeling of Natural Images. Journal of Mathematical Imaging and Vision.

Fridrich Jessica, Goljan Miroslav and Du Rui. 2001. Reliable Detection of LSB Steganography in Color and Grayscale Images.

Fridrich and Goljan M. and Du R. 2001. Detecting LSB steganography in color and grayscale images. IEEE Multimedia 8, pp. 22–28.

Nabaee H. and Faez K. 2010. An efficient steganography method based on reducing changes. 25th International Conference of Image and Vision Computing New Zealand (IVCNZ), (pp.1 – 7).

Toony Z., Sajedi H. and Jamzad M. 2009. A high capacity image hiding method based on fuzzy image coding/decoding. Computer Conference, CSICC 2009. 14th International CSI, (pp. 518 – 523).

Sajedi H. and Harif. 2008. Cover Selection Steganography Method Based on Similarity of Image Blocks.

Bohme R. 2010. Advanced Statistical Steganalysis (2010 edition). Springer.

Marincola J. M. 1996. Herodotus: The Histories.

Landau S., Kent S., Brooks C., Charney S., Denning D., Diffie W., Lauck A., Miller D., Neumann P. and Sobel D. 1994. Codes, Keys and Conflicts: Issues in U.S. Crypto Policy. Rep. of a Special Panel of the ACM U.S. Public Policy Committee.

Beaver D. 2008. 10 billion photos. (October 2008). Retrieved April 12, 2015 from


Fridrich J., Goljan M. and Du R. 2008. Detecting LSB steganography in color, and grayscale images. IEEE Multimedia, vol. 8 no.4, pp. 22 – 28.

Dumitrescu S., Wu X. and Wang Z. 2003. Detection of LSB steganography via sample pair analysis. IEEE Transaction on Signal processing, vol. 51, no. 7, pp. 1995-2007, 220.

Zhang T. and Ping X. 2003. A new approach to reliable detection of LSB steganography in natural images. In Signal processing (Vol. 83, pp. 2085-2093, 2003).

Kerckhoffs A. 1883. La cryptographie militaire (Vol. ser. 9 ). J. des Sciences Militaires.

Nikiforakis N. and Acar G. 2014. Browse at your own risk. Spectrum, IEEE, Volume: 51, Issue: 8 , pp. 30 - 35.

Eckersley P. 2010. How Unique is Your Web Browser? Proceedings of the Privacy Enhancing Technologies Symposium (PETS 2010). pp. 1-18

Lululemon Black Friday cheap nfl jerseys Lululemon factory Outlet ny Black Friday discount tiffany outlet wholesale soccer jerseys online oakley black friday cheap nhl jerseys china cheap nfl jerseys north face black friday sale cheap nfl jerseys online Jordans Black Friday Sale 2015 Cheap Moncler Cyber Monday moncler outlet cheap soccer jerseys moncler outlet black friday cheap authentic nfl jerseys north face cyber monday Louboutin Black Friday canada wholesale cheap nfl jerseys lululemon cyber monday 2015 cheap nfl jerseys from china 2015 Cheap Moncler Black Friday Sale Moncler Cyber Monday 2015 cheap jerseys Lululemon Cyber Monday Sale jordans cyber monday deals 2015 cheap nike nfl jerseys Black Friday deals Lululemon 2015 jordan black friday 2015 Moncler Jackets Black Friday Sale 2015 Louboutin Pas Cher Black Friday 2015 Canada Lululemon north face black friday cheap wholesale soccer jerseys