{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:40Z","timestamp":1750307500868,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,10]],"date-time":"2008-09-10T00:00:00Z","timestamp":1221004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,10]]},"DOI":"10.1145\/1621087.1621097","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:23:22Z","timestamp":1254853402000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of distributed steganographic information in social networks"],"prefix":"10.1145","author":[{"given":"Alfonso Mu\u00f1oz","family":"Mu\u00f1oz","sequence":"first","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Carretera de Valencia, Madrid"}]},{"given":"Justo Carracedo","family":"Gallardo","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Carretera de Valencia, Madrid"}]},{"given":"Sergio S\u00e1nchez","family":"Garc\u00eda","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Carretera de Valencia, Madrid"}]}],"member":"320","published-online":{"date-parts":[[2008,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"4157","volume":"84","author":"Carracedo J.","year":"2004","journal-title":"Telem\u00e1ticas. Mc-Graw Hill InterAmericana de Espa\u00f1a. ISBN"},{"key":"e_1_3_2_1_2_1","unstructured":"Kahn D. The CodeBreakers. The Comprehensive History of Secret Communication from Ancient Times to the Internet. Editorial: Scribner ISBN: 0-684-83130-9.  Kahn D. The CodeBreakers. The Comprehensive History of Secret Communication from Ancient Times to the Internet. Editorial: Scribner ISBN: 0-684-83130-9."},{"key":"e_1_3_2_1_3_1","unstructured":"Katzenbeisser S. Petticolas F. Information Hiding techniques for steganography and digital watermarking. Artech House Publishers. ISBN: 1-58053-035-4   Katzenbeisser S. Petticolas F. Information Hiding techniques for steganography and digital watermarking. Artech House Publishers. ISBN: 1-58053-035-4"},{"key":"e_1_3_2_1_4_1","unstructured":"Johnson N. F. Duric Z. Jajodia S. Information Hiding. Steganography and watermarking -- Attacks and countermeasures. ISBN 0-7923-7204-2  Johnson N. F. Duric Z. Jajodia S. Information Hiding. Steganography and watermarking -- Attacks and countermeasures. ISBN 0-7923-7204-2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Boyd D. Ellison N. Social Network Sites: Definition history and scholarship. University of California-Berkeley. http:\/\/jcmc.indiana.edu\/vol13\/issue1\/boyd.ellison.html  Boyd D. Ellison N. Social Network Sites: Definition history and scholarship. University of California-Berkeley. http:\/\/jcmc.indiana.edu\/vol13\/issue1\/boyd.ellison.html","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"e_1_3_2_1_6_1","unstructured":"Wikipedia Source. List of Social Networking WebSites http:\/\/en.wikipedia.org\/wiki\/List_of_social_networking_websites  Wikipedia Source. List of Social Networking WebSites http:\/\/en.wikipedia.org\/wiki\/List_of_social_networking_websites"},{"key":"e_1_3_2_1_7_1","unstructured":"Cox I. Miller M. Bloom J. Fridrich J. Kalker T. Digital Watermarking and Steganography. Morgan Kaufmann Publishers 2008. ISBN: 978-0-12-372585-1   Cox I. Miller M. Bloom J. Fridrich J. Kalker T. Digital Watermarking and Steganography. Morgan Kaufmann Publishers 2008. ISBN: 978-0-12-372585-1"},{"key":"e_1_3_2_1_8_1","unstructured":"Forrest S. HTML Steganography Tool. Disponible: http:\/\/wandership.ca\/projects\/deogol\/intro.html  Forrest S. HTML Steganography Tool. Disponible: http:\/\/wandership.ca\/projects\/deogol\/intro.html"},{"key":"e_1_3_2_1_9_1","unstructured":"Shing I. Makino K. Ichiro M. Osamu T. A Proposal on Information Hiding Methods using XML. Mitsubishi Research Institute Inc Communications Research Laboratory Yokohama National University and The University of Tokyo.  Shing I. Makino K. Ichiro M. Osamu T. A Proposal on Information Hiding Methods using XML. Mitsubishi Research Institute Inc Communications Research Laboratory Yokohama National University and The University of Tokyo."},{"key":"e_1_3_2_1_10_1","unstructured":"Huang H. Sun X. Li Z. Sun G. Detection of Hidden Information in Webpage. Hhj0906@163.com  Huang H. Sun X. Li Z. Sun G. Detection of Hidden Information in Webpage. Hhj0906@163.com"},{"key":"e_1_3_2_1_11_1","unstructured":"Bauer M. New Covert Channels in HTTP Adding Unwitting Web Browsers to Anonymity Sets. Institut f\u00fcr Informatik Martensstrasse 3 91058 Erlangen Germany matthiasb@acm.org  Bauer M. New Covert Channels in HTTP Adding Unwitting Web Browsers to Anonymity Sets. Institut f\u00fcr Informatik Martensstrasse 3 91058 Erlangen Germany matthiasb@acm.org"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Chapman M. HIDING THE HIDDEN: A SOFTWARE SYSTEM FOR CONCEALING CIPHERTEXT AS INNOCUOUS TEXT. A Thesis Submitted in Partial Fulfillment of the Requirements for the degree of Master of Science in Computer Science at The University of Wisconsin-Milwaukee May 1997.  Chapman M. HIDING THE HIDDEN: A SOFTWARE SYSTEM FOR CONCEALING CIPHERTEXT AS INNOCUOUS TEXT. A Thesis Submitted in Partial Fulfillment of the Requirements for the degree of Master of Science in Computer Science at The University of Wisconsin-Milwaukee May 1997.","DOI":"10.1007\/BFb0028489"},{"key":"e_1_3_2_1_13_1","unstructured":"Bergmair R. A comprehensive bibliography of linguistic steganography. http:\/\/semantilog.ucam.org\/biblingsteg\/  Bergmair R. A comprehensive bibliography of linguistic steganography. http:\/\/semantilog.ucam.org\/biblingsteg\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Munoz A. Carracedo J. StegSecret: una herramienta p\u00fablica de estegoan\u00e1lisis. Disponible: http:\/\/stegsecret.sourceforge.net\/  Munoz A. Carracedo J. StegSecret: una herramienta p\u00fablica de estegoan\u00e1lisis. Disponible: http:\/\/stegsecret.sourceforge.net\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Kelley J. Terrorist instructions hidden online. Usa Today 5\/02\/2001. Disponible: http:\/\/www.usatoday.com_\/tech\/_news\/2001-02-05-binladen-side.htm  Kelley J. Terrorist instructions hidden online. Usa Today 5\/02\/2001. Disponible: http:\/\/www.usatoday.com_\/tech\/_news\/2001-02-05-binladen-side.htm"},{"key":"e_1_3_2_1_16_1","unstructured":"Westfeld A. Pfitzmann A. Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego Jsteg Steganos and S-Tools--and Some Lessons Learned. Dresden University of Technology Department of Computer Science D-01062 Dresden Germany {westfeld pfitza}@inf.tu-dresden.de  Westfeld A. Pfitzmann A. Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego Jsteg Steganos and S-Tools--and Some Lessons Learned. Dresden University of Technology Department of Computer Science D-01062 Dresden Germany {westfeld pfitza}@inf.tu-dresden.de"},{"key":"e_1_3_2_1_17_1","unstructured":"Fridrich J. Goljan M. Du R. Reliable Detection of LSB Steganography in color and Grayscale Images. SUNY Binghamton. fridrich@binghamton.edu  Fridrich J. Goljan M. Du R. Reliable Detection of LSB Steganography in color and Grayscale Images . SUNY Binghamton. fridrich@binghamton.edu"},{"key":"e_1_3_2_1_18_1","unstructured":"Fridrich J. Goljan M. Soukal D. Higher-order statistical steganalysis of palette images. Department of Electrical and Computer Engineering Department of Computer Science SUNY Binghamton Binghamton NY 13902--6000.  Fridrich J. Goljan M. Soukal D. Higher-order statistical steganalysis of palette images . Department of Electrical and Computer Engineering Department of Computer Science SUNY Binghamton Binghamton NY 13902--6000."},{"key":"e_1_3_2_1_19_1","unstructured":"Fridrich J. Goljan M. Hogea D. Attacking the Outguess. http:\/\/www.ws.binghamton.edu\/fridrich  Fridrich J. Goljan M. Hogea D. Attacking the Outguess . http:\/\/www.ws.binghamton.edu\/fridrich"},{"key":"e_1_3_2_1_20_1","unstructured":"Fridrich J. Goljan M. Hogea D. Steganalysis of JPEG Images: Breaking the F5 Algorithm. http:\/\/www.ws.binghamtom.edu\/fridrich  Fridrich J. Goljan M. Hogea D. Steganalysis of JPEG Images: Breaking the F5 Algorithm . http:\/\/www.ws.binghamtom.edu\/fridrich"},{"key":"e_1_3_2_1_21_1","unstructured":"Pevny T. Fridrich J. Multi-class Blind Steganalyzer for JPEG Images. Department of Computer Science Department of Electrical and Computer Engineering SUNY Binghamton Binghamton NY 13902--6000.  Pevny T. Fridrich J. Multi-class Blind Steganalyzer for JPEG Images . Department of Computer Science Department of Electrical and Computer Engineering SUNY Binghamton Binghamton NY 13902--6000."},{"key":"e_1_3_2_1_22_1","unstructured":"Doctorow C. Solving and creating captchas with free porn. Disponible: http:\/\/www.boingboing.net\/2004\/01\/27\/solving-and-creating.html  Doctorow C. Solving and creating captchas with free porn . Disponible: http:\/\/www.boingboing.net\/2004\/01\/27\/solving-and-creating.html"},{"key":"e_1_3_2_1_23_1","unstructured":"Mu\u00f1oz A. Arquitectura para Detecci\u00f3n de Informaci\u00f3n Esteganografiada. Proyecto Final de Carrera. Tutor: D. Justo Carracedo Gallardo Universidad Polit\u00e9cnica de Madrid. Escuela T\u00e9cnica Superior de Ingenieros de Telecomunicaci\u00f3n. amunoz@diatel.upm.es (2006)  Mu\u00f1oz A. Arquitectura para Detecci\u00f3n de Informaci\u00f3n Esteganografiada . Proyecto Final de Carrera. Tutor: D. Justo Carracedo Gallardo Universidad Polit\u00e9cnica de Madrid. Escuela T\u00e9cnica Superior de Ingenieros de Telecomunicaci\u00f3n. amunoz@diatel.upm.es (2006)"},{"key":"e_1_3_2_1_24_1","unstructured":"Camufla Web. http:\/\/usuarios.lycos.es\/taxylon\/programas.htm  Camufla Web. http:\/\/usuarios.lycos.es\/taxylon\/programas.htm"},{"key":"e_1_3_2_1_25_1","unstructured":"jHTTPp2. An Open Source HTTP Proxy Server. Disponible: http:\/\/jhttp2.sourceforge.net\/  jHTTPp2. An Open Source HTTP Proxy Server . Disponible: http:\/\/jhttp2.sourceforge.net\/"},{"key":"e_1_3_2_1_26_1","unstructured":"Hogben G. Security Issues and Recommendations for Online Social Networks. European Network and Information Security Agency. October 2007.  Hogben G. Security Issues and Recommendations for Online Social Networks. European Network and Information Security Agency . October 2007."},{"key":"e_1_3_2_1_27_1","unstructured":"Bao F. Wang X. Steganography of Short Messages Through Accessories. Laboratories for Information Technology Heng Mui Keng Terrace Singapore 119613 {baofeng xkwang}@lit.org.sg  Bao F. Wang X. Steganography of Short Messages Through Accessories. Laboratories for Information Technology Heng Mui Keng Terrace Singapore 119613 {baofeng xkwang}@lit.org.sg"},{"key":"e_1_3_2_1_28_1","unstructured":"Spam mail Steganography. http:\/\/www.spammimic.com  Spam mail Steganography. http:\/\/www.spammimic.com"}],"event":{"name":"EATIS08: Euro American Conference on Telematics and Information Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGMM ACM Special Interest Group on Multimedia"],"location":"Aracaju Brazil","acronym":"EATIS08"},"container-title":["Proceedings of the 2008 Euro American Conference on Telematics and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621087.1621097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1621087.1621097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:46Z","timestamp":1750249066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621087.1621097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,10]]},"references-count":28,"alternative-id":["10.1145\/1621087.1621097","10.1145\/1621087"],"URL":"https:\/\/doi.org\/10.1145\/1621087.1621097","relation":{},"subject":[],"published":{"date-parts":[[2008,9,10]]},"assertion":[{"value":"2008-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}