Skip to main content

CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14451))

Included in the following conference series:

  • 561 Accesses

Abstract

The generative linguistic steganography in social networks have potential huge abuse and regulatory risks, with serious implications for information security, especially in the era of large language models. Many works have explored detecting steganographic texts with progressively enhanced imperceptibility, but they can only achieve poor performance in real social network scenarios. One key reason is that these methods primarily focus on linguistic features, which are extremely insufficient owing to the fragmentation of social texts. In this paper, we propose a novel method called CATS (Connection-aware and interAction-based Text Steganalysis) to effectively detected the potentially malicious steganographic texts. CATS captures social networks connection information by graph representation learning, enhances linguistic features by contrastive learning and fully integrates features above via a novel features interaction module. Our experimental results demonstrate that CATS outperforms existing methods by exploiting social network graph structure features and interactions in social network environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bak, P., Bieniasz, J., Krzeminski, M., Szczypiorski, K.: Application of perfectly undetectable network steganography method for malware hidden communication. In: 2018 4th International Conference on Frontiers of Signal Processing (ICFSP), pp. 34–38. IEEE (2018)

    Google Scholar 

  2. Li, F., Yu, Z., Qin, C.: GAN-based spatial image steganography with cross feedback mechanism. Signal Process. 190, 108341 (2022)

    Article  Google Scholar 

  3. Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011). https://doi.org/10.1109/TIFS.2011.2108649

    Article  Google Scholar 

  4. Kaptchuk, G., Jois, T.M., Green, M., Rubin, A.D.: Meteor: cryptographically secure steganography for realistic distributions. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS 2021, pp. 1529–1548. Association for Computing Machinery, New York (2021). https://doi.org/10.1145/3460120.3484550

  5. Wayner, P.C.: Mimic functions. Cryptologia 16, 193–214 (1992)

    Article  MathSciNet  Google Scholar 

  6. Shirali-Shahreza, M.: Text steganography by changing words spelling. In: 2008 10th International Conference on Advanced Communication Technology, Gangwon, Korea (South), 2008, pp. 1912–1913 (2008). https://doi.org/10.1109/ICACT.2008.4494159

  7. Ziegler, Z.M., Deng, Y., Rush, A.M.: Neural linguistic steganography. arXiv preprint arXiv:1909.01496 (2019)

  8. Zhou, X., Peng, W., Yang, B., Wen, J., Xue, Y., Zhong, P.: Linguistic steganography based on adaptive probability distribution. IEEE Trans. Depend. Secure Comput. 19(5), 2982–2997 (2021)

    Article  Google Scholar 

  9. Zhang, S., Yang, Z., Yang, J., Huang, Y.: Provably secure generative linguistic steganography, pp. 3046–3055 (2021). https://aclanthology.org/2021.findings-acl.268

  10. de Witt, C.S., Sokota, S., Kolter, J.Z., Foerster, J., Strohmeier, M.: Perfectly secure steganography using minimum entropy coupling. arXiv preprint arXiv:2210.14889 (2022)

  11. Ouyang, L., et al.: Training language models to follow instructions with human feedback. arXiv preprint arXiv:2203.02155 (2022)

  12. Touvron, H., et al.: Llama: open and efficient foundation language models (2023)

    Google Scholar 

  13. Dai, W., Yu, Y., Dai, Y., Deng, B.: Text steganography system using markov chain source model and des algorithm. JSW 5(7), 785–792 (2010)

    Article  Google Scholar 

  14. Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)

    Article  Google Scholar 

  15. Dai, F., Cai, Z.: Towards near-imperceptible steganographic text. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 4303–4308. Association for Computational Linguistics, Florence (2019). https://aclanthology.org/ P19-1422 (2019)

  16. Yang, H., Cao, X.: Linguistic steganalysis based on meta features and immune mechanism. Chin. J. Electron. 19(4), 661–666 (2010)

    Google Scholar 

  17. Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071–1081 (2011)

    Article  Google Scholar 

  18. Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimedia Tools Appl. 71(3), 1893–1911 (2014)

    Article  Google Scholar 

  19. Meng, P., Hang, L., Chen, Z., Hu, Y., Yang, W.: STBS: a statistical algorithm for steganalysis of translation-based steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 208–220. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_16

    Chapter  Google Scholar 

  20. Meng, P., Hang, L., Yang, W., Chen, Z., Zheng, H.: Linguistic steganography detection algorithm using statistical language model. In: 2009 International Conference on Information Technology and Computer Science, vol. 2, pp. 540–543. IEEE (2009)

    Google Scholar 

  21. Yang, Z., Huang, Y., Zhang, Y.J.: A fast and efficient text steganalysis method. IEEE Signal Process. Lett. 26(4), 627–631 (2019)

    Article  Google Scholar 

  22. Zou, J., Yang, Z., Zhang, S., Rehman, S., Huang, Y.: High-performance linguistic steganalysis, capacity estimation and steganographic positioning. In: Zhao, X., Shi, Y.-Q., Piva, A., Kim, H.J. (eds.) IWDW 2020. LNCS, vol. 12617, pp. 80–93. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69449-4_7

    Chapter  Google Scholar 

  23. Yang, Z., Huang, Y., Zhang, Y.J.: TS-CSW: text steganalysis and hidden capacity estimation based on convolutional sliding windows. Multimedia Tools Appl. 79, 18293–18316 (2020)

    Article  Google Scholar 

  24. Niu, Y., Wen, J., Zhong, P., Xue, Y.: A hybrid r-bilstm-c neural network based text steganalysis. IEEE Signal Process. Lett. 26(12), 1907–1911 (2019)

    Article  Google Scholar 

  25. Xu, Q., Zhang, R., Liu, J.: Linguistic steganalysis by enhancing and integrating local and global features. IEEE Signal Process. Lett. 30, 16–20 (2023)

    Article  Google Scholar 

  26. Wen, J., Deng, Y., Peng, W., Xue, Y.: Linguistic steganalysis via fusing multi-granularity attentional text features. Chin. J. Electron. 32(1), 76–84 (2023)

    Article  Google Scholar 

  27. Wu, H., Yi, B., Ding, F., Feng, G., Zhang, X.: Linguistic steganalysis with graph neural networks. IEEE Signal Process. Lett. 28, 558–562 (2021)

    Article  Google Scholar 

  28. Fu, Z., Yu, Q., Wang, F., Ding, C.: HGA: hierarchical feature extraction with graph and attention mechanism for linguistic steganalysis. IEEE Signal Process. Lett. 29, 1734–1738 (2022)

    Article  Google Scholar 

  29. Peng, W., Zhang, J., Xue, Y., Yang, Z.: Real-time text steganalysis based on multi-stage transfer learning. IEEE Signal Process. Lett. 28, 1510–1514 (2021)

    Article  Google Scholar 

  30. Yang, J., Yang, Z., Zhang, S., Tu, H., Huang, Y.: SeSy: linguistic steganalysis framework integrating semantic and syntactic features. IEEE Signal Process. Lett. 29, 31–35 (2021)

    Article  Google Scholar 

  31. Yang, J., Yang, Z., Zou, J., Tu, H., Huang, Y.: Linguistic steganalysis toward social network. IEEE Trans. Inf. Forensics Secur. 18, 859–871 (2023)

    Article  Google Scholar 

  32. Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.-J.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Process. Lett. 26(12), 1743–1747 (2019)

    Article  Google Scholar 

  33. Gao, T., Yao, X., Chen, D.: Simcse: simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821 (2021)

  34. Zhang, J., Shi, X., Xie, J., Ma, H., King, I., Yeung, D.Y.: Gaan: gated attention networks for learning on large and spatiotemporal graphs. In: 34th Conference on Uncertainty in Artificial Intelligence 2018, UAI 2018 (2018)

    Google Scholar 

  35. Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)

  36. Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China under Grant U1936216 and Grant 61862002.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pang, K. et al. (2024). CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks. In: Luo, B., Cheng, L., Wu, ZG., Li, H., Li, C. (eds) Neural Information Processing. ICONIP 2023. Lecture Notes in Computer Science, vol 14451. Springer, Singapore. https://doi.org/10.1007/978-981-99-8073-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8073-4_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8072-7

  • Online ISBN: 978-981-99-8073-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics