A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments

被引:2
|
作者
Mao, Chun [1 ]
Li, Zhenyu [1 ]
Zhang, Mingliang [1 ]
Zhang, Yi [1 ]
Luo, Xiangyang [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Henan Prov Key Lab Cyberspace Situat Awareness, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Social networking (online); Behavioral sciences; Robustness; Faces; Delays; Semantics; Payloads; Covert communication; social media; bullet comment; time modulation; secure operation; STEGANOGRAPHY;
D O I
10.1109/TCE.2023.3277919
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Consumers often have the need to use social media to transmit secret information, but such communication often faces distortion due to lossy compression and limited sending frequency. In order to solve these issues, this paper proposes a covert communication method based on the time modulation of online video bullet comments. Bullet comment is a kind of time-anchored on-screen comment, which is a popular feature for online video platforms. The proposed method converts the absolute time and relative time of the bullet comments to carry the index value of the loaded bullet comments and encrypted characters. The receiver converts the time information of the obtained bullet comments into index values and uses them to extract the secret message. The experimental results show that the proposed method is suitable for multiple online video platforms. Compared with the existing covert communication methods based on social media, the secure operation frequency of the proposed method is at least 9.06 times higher when sending a secret message of the same length. The security of the proposed method is evaluated by the metrics designed according to the characteristics of the large-scale bullet comments.
引用
收藏
页码:568 / 580
页数:13
相关论文
共 50 条
  • [41] Modulation recognition method of satellite communication based on CLDNN model
    Jiang, Jiahao
    Wang, Zhelong
    Zhao, Hongyu
    Qiu, Sen
    Li, Jiaxi
    PROCEEDINGS OF 2021 IEEE 30TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2021,
  • [42] Modulation Recognition Method of Communication Signals Based on Correlation Characteristics
    Zeng Chuangzhan
    Jia Xin
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 406 - 410
  • [43] Method of modulation identification for communication signals based on fuzzy integral
    Lu, T.J.
    Guo, S.B.
    Xiao, X.C.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2001, 29 (06): : 808 - 810
  • [44] A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping
    Zhang, Pei
    Cheng, Qingfeng
    Zhang, Mingliang
    Luo, Xiangyang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4469 - 4480
  • [45] Collaborative Covert Communication Design Based on Lattice Reduction Aided Multiple User Detection Method
    Yu, Baoguo
    Bao, Yachuan
    Wei, Haitao
    Huang, Xin
    Shu, Yuquan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [46] Analysis and Modeling of Enterprise Competitive Intelligence Based on Social Media User Comments
    Ding, Jian-lan
    Shi, Bing
    ENTREPRENEURSHIP RESEARCH JOURNAL, 2021, 11 (02) : 47 - 69
  • [47] A real-time method to predict social media popularity
    Chen, Xiao
    Lu, Zhe-Ming
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2017, 28 (12):
  • [48] Sentiment analysis of social media comments based on multimodal attention fusion network
    Liu, Ziyu
    Yang, Tao
    Chen, Wen
    Chen, Jiangchuan
    Li, Qinru
    Zhang, Jun
    APPLIED SOFT COMPUTING, 2024, 164
  • [49] A User-Recommendation Method Based on Social Media
    Hong Chen
    Shengmei Luo
    Lei Hu
    Xiuwen Wang
    ZTECommunications, 2014, 12 (01) : 57 - 61
  • [50] Covert timing channel detection method based on time interval and payload length analysis
    Han, Jiaxuan
    Huang, Cheng
    Shi, Fan
    Liu, Jiayong
    COMPUTERS & SECURITY, 2020, 97