Skip to main content

An NLP-Based Cryptosystem to Control Spread of Fake News Through Social-Media

  • Conference paper
  • First Online:
  • 570 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1119))

Abstract

The era of digitalization has seen a transition from traditional methods of providing services to digital means. The advancement of technological innovations has not only impacted the human lifestyle but also has aided the growth of various social channels for people to communicate with one another. But the rise of social media platforms has also led to the spread of fake news. Fake news spread fast and can affect the brand image of various product/service-based organizations. To reduce the effect of fake news, we have proposed a method to temporarily encrypt the message sent from a consumer using the company’s tag for a fixed time, say, 1 day, in Twitter, hence giving the company the time to respond to the concerns raised by the customer. Once the response is received, or the stipulated time ends, the message will be made visible to the public automatically.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ravaglia, V., Brivio, E., Graffigna, G.: Engaging consumers via Twitter: three successful communicative strategies. Digital marketing and consumer engagement: concepts, methodologies, tools, and applications (2018)

    Google Scholar 

  2. Tandoc Jr., E.C., Lim, Z.W., Ling, R.: Defining ‘fake news’. Digit. J. 6(2), 137–153 (2017)

    Google Scholar 

  3. Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J.: Progress in computing, analytics and networking. In: Proceedings of ICCAN (2017)

    Google Scholar 

  4. Nayak, J., Naik, B., Jena, A.K., Barik, R.K., Das, H.: Nature inspired optimizations in cloud computing: applications and challenges. In: Cloud Computing for Optimization: Foundations, Applications, and Challenges, pp. 1–26. Springer, Cham (2018)

    Google Scholar 

  5. Sahoo, A.K., Mallik, S., Pradhan, C., Mishra, B.S.P., Barik, R.K., Das, H.: Intelligence-based health recommendation system using big data analytics. In: Big Data Analytics for Intelligent Healthcare Management, pp. 227–246. Academic Press (2019)

    Google Scholar 

  6. WolframMathWorld: http://mathworld.wolfram.com/SubsetSumProblem.html

  7. Merkle, R., Hellman, M.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inf. Theory 24, 525–530 (1978)

    Article  Google Scholar 

  8. Weng, L., Flammini, A., Vespignani, A., Menczer, F.: Competition among memes in a world with limited attention (2012)

    Google Scholar 

  9. Simon, T., Goldbergb, A., Adinia, B.: Socializing in emergencies—a review of the use of social media in emergency situations. Int. J. Inf. Manage. 35, 609–619 (2015)

    Article  Google Scholar 

  10. Sahani, R., Rout, C., Badajena, J.C., Jena, A.K., Das, H.: Classification of intrusion detection using data mining techniques. In: Progress in Computing, Analytics and Networking, pp. 753–764. Springer, Singapore (2018)

    Google Scholar 

  11. Bellare, M., Kilian, J., Rogaway, P.: The security of cipher block chaining. Adv. Cryptol. CRYPTO 94, 341–358 (1994)

    Google Scholar 

  12. Lagarias, J.C.: Performance analysis of Shamir’s attack on the basic Merkle-Hellman knapsack cryptosystem. International Colloquium on Automata, Languages, and Programming, pp. 312–323. (1984)

    Google Scholar 

  13. Ray, A., Padhmavathi, B., Anjum, A., Bhat, S.: Improvement of CBC encryption technique by using the Merkle-Hellman Knapsack Cryptosystem. Intelligent Systems and Control (ISCO), pp. 340–344 (2013)

    Google Scholar 

  14. Pradhan, C., Das, H., Naik, B., Dey, N.: Handbook of Research on Information Security in Biomedical Signal Processing, pp. 1–414. IGI Global, Hershey, PA (2018)

    Book  Google Scholar 

  15. Das, H., Naik, B., Behera, H. S.: Classification of Diabetes Mellitus Disease (DMD): A Data Mining (DM) Approach. In: Progress in Computing, Analytics and Networking, pp. 539–549. Springer, Singapore. (2018)

    Google Scholar 

  16. Das, H., Jena, A.K., Nayak, J., Naik, B., Behera, H.S. A novel PSO based back propagation learning-MLP (PSO-BP-MLP) for classification. In: Computational Intelligence in Data Mining, vol. 2, pp. 461–471. Springer, New Delhi (2015)

    Google Scholar 

Download references

Acknowledgements

We would like to thank the authors whose papers we have cited for helping us with the idea of the proposed model. I would also like to thank Twitter and Snapdeal whose data we have used for our study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arghya Ray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ray, A., Bala, P.K. (2020). An NLP-Based Cryptosystem to Control Spread of Fake News Through Social-Media. In: Das, H., Pattnaik, P., Rautaray, S., Li, KC. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 1119. Springer, Singapore. https://doi.org/10.1007/978-981-15-2414-1_44

Download citation

Publish with us

Policies and ethics