Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography

While social network services have become popular platforms where large amounts of user-generated content are published, individuals, election campaigns, and political organizations leverage the services to publish, promote, and exchange political messages. However, sometimes, political discussions resulted in heated debates, doxing, and even cyberbullying. These conflicts may decrease the engagement of users and prevent them from publishing articles with apparent political orientation. To help users to post political opinion among the Internet freely, in this paper, we employ the concept of deniable encryption to generate neutral-like articles composed of two critics toward both sides of the discussion, while one of the critics is the actual message from the author to particular recipients. For receivers who know the credential information (e.g., key and codebook), they can communicate with each other by extracting the real information from the neutral-like articles. For people with the opposite stand, they cannot claim the message that is supporting specific political entity, as it contains disapproval to both stands; besides, they cannot prove that which part of the message is the plaintext even if they intercept the messages. We provide a generalized process of our proposal and present a practical scenario using transcripts, Facebook posts of Donald Trump, and posts of Hillary Clinton to demonstrate the usability of our scheme.

[1]  A. Beale,et al.  Cyberbullying: What School Administrators (and Parents) Can Do , 2007 .

[2]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[3]  Maged Hamada Ibrahim,et al.  A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..

[4]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[5]  Polina Panicheva,et al.  Dark personalities on Facebook: Harmful online behaviors and language , 2018, Comput. Hum. Behav..

[6]  Liusheng Huang,et al.  Hiding Information by Context-Based Synonym Substitution , 2009, IWDW.

[7]  Alessandro Acquisti,et al.  Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.

[8]  M.H. Shirali-Shahreza,et al.  Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[9]  R. Kelly Garrett,et al.  Driving a Wedge Between Evidence and Beliefs: How Online Ideological News Exposure Promotes Political Misperceptions , 2016, J. Comput. Mediat. Commun..

[10]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[11]  Per Carlbring,et al.  A review of cyberbullying and suggestions for online psychological therapy , 2015 .

[12]  Girish J. Gulati,et al.  Gulati elections of 2006 and 2008 Social networks in political campaigns : Facebook and the congressional , 2013 .

[13]  Sangita Roy,et al.  A novel approach to format based text steganography , 2011, ICCCS '11.

[14]  Ran Canetti,et al.  Fully Bideniable Interactive Encryption , 2018, IACR Cryptol. ePrint Arch..

[15]  Linna Zhou,et al.  Text Steganography Based on Online Chat , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[16]  Hsin-Chen Lin,et al.  How Political Candidates' Use of Facebook Relates to the Election Outcomes , 2017 .

[17]  Kyu S. Hahn,et al.  Red Media, Blue Media: Evidence of Ideological Selectivity in Media Use , 2009 .

[18]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[19]  Zongkui Zhou,et al.  Cyberbullying and its risk factors among Chinese high school students , 2013 .

[20]  Chin-Laung Lei,et al.  Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan , 2017, Comput. J..

[21]  Yang Zhang,et al.  Human Flesh Search Engine and Online Privacy , 2016, Sci. Eng. Ethics.

[22]  Brent Waters,et al.  Bi-Deniable Public-Key Encryption , 2011, CRYPTO.

[23]  James M. Snyder,et al.  Empirical Studies of Media Bias , 2015 .

[24]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[25]  Juan Enrique Ramos,et al.  Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .

[26]  Peter Waiganjo Wagacha,et al.  Genetic Algorithm Based Model in Text Steganography , 2013 .

[27]  Girish J. Gulati,et al.  Social Media and Campaign 2012 , 2013 .

[28]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[29]  E. Noelle-Neumann The Spiral of Silence A Theory of Public Opinion , 1974 .

[30]  Marina Blanton,et al.  Deniable cloud storage: sharing files via public-key deniability , 2010, WPES '10.

[31]  Rafail Ostrovsky,et al.  Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..

[32]  Homero Gil de Zúñiga,et al.  Effects of Editorial Media Bias Perception and Media Trust on the Use of Traditional, Citizen, and Social Media News , 2017 .

[33]  J. Cappella,et al.  Echo Chamber: Rush Limbaugh and the Conservative Media Establishment , 2008 .

[34]  M. Strohmaier,et al.  When populists become popular: comparing Facebook use by the right-wing movement Pegida and German political parties , 2017 .

[35]  Markus Dürmuth,et al.  Deniable Encryption with Negligible Detection Probability: An Interactive Construction , 2011, EUROCRYPT.

[36]  Marek Klonowski,et al.  Practical Deniable Encryption , 2008, SOFSEM.

[37]  G. Prashanth Audit-Free Cloud Storage via Deniable Attribute based Encryption , 2017 .

[38]  Weiwu Zhang,et al.  Gay Bullying and Online Opinion Expression , 2014 .

[39]  L. Gao The emergence of the Human Flesh Search Engine and political protest in China: exploring the Internet and online collective action , 2016 .