A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping

被引:1
作者
Zhang, Pei [1 ]
Cheng, Qingfeng [1 ]
Zhang, Mingliang [1 ]
Luo, Xiangyang [1 ]
机构
[1] Henan Key Lab Cyberspace Situat Awareness, Zhengzhou 450001, Peoples R China
关键词
Blockchain; covert communication; STC mapping; security; shamir threshold; STEGANOGRAPHY; AUTHENTICATION;
D O I
10.1109/TDSC.2024.3353570
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Covert communication is a crucial technology that hides information in the redundant structure of the file and transmission through public channel to achieve the secure delivery of information. The existing covert communication methods face certain challenges based on blockchain, such as the lack of a secure channel for transferring the master key, low embedding capacity, and weak detection resistance. In view of this, this paper proposes a covert communication method based on Shamir threshold and STC mapping, which is suitable for public chain networks. The proposed method first decomposes the master key into sub-keys by introducing Shamir scheme, and the sub-keys are shared with the help of transaction amounts on a blockchain. Then, a mapping relation is established to ensure that the transaction amounts carrying the secret are evenly distributed. Finally, secret information is hidden in the mapping relationship and the transaction amount is interwoven, which is published to the blockchain through transactions to complete covert communication. The introduction of Shamir threshold breaks the limitation that master key cannot be safely transmitted due to the lack of a secure channel in the research of covert communication based on blockchain, thereby enhances the security of the method. A series of experimental results illustrate that the proposed method is more resistant to detection, and the embedding efficiency is enhanced by up to 27.56 times compared with existing public chain-based covert communication methods, effectively reducing the number of transactions and saving resource consumption.
引用
收藏
页码:4469 / 4480
页数:12
相关论文
共 29 条
  • [1] Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences
    Altschaffel, Robert
    Hielscher, Jonas
    Kiltz, Stefan
    Dittmann, Jana
    [J]. PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, : 23 - 33
  • [2] Chain-Based Covert Data Embedding Schemes in Blockchain
    Cao, Haotian
    Yin, Hao
    Gao, Feng
    Zhang, Zijian
    Khoussainov, Bakh
    Xu, Shubin
    Zhu, Liehuang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14699 - 14707
  • [3] Blockchain Meets Covert Communication: A Survey
    Chen, Zhuo
    Zhu, Liehuang
    Jiang, Peng
    Zhang, Can
    Gao, Feng
    He, Jialing
    Xu, Dawei
    Zhang, Yan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (04): : 2163 - 2192
  • [4] Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 920 - 935
  • [5] Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. MEDIA FORENSICS AND SECURITY II, 2010, 7541
  • [6] Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid
    Gai, Keke
    Wu, Yulu
    Zhu, Liehuang
    Qiu, Meikang
    Shen, Meng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) : 3548 - 3558
  • [7] Zephyrus: An Information Hiding Mechanism Leverging Ethereum Data Fields
    Gimenez-Aguilar, Mar
    De Fuentes, Jose M.
    Gonzalez-Manzano, Lorena
    Camara, Carmen
    [J]. IEEE ACCESS, 2021, 9 : 118553 - 118570
  • [8] Universal distortion function for steganography in an arbitrary domain
    Holub, Vojtech
    Fridrich, Jessica
    Denemark, Tomas
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
  • [9] Securing Liveness Detection for Voice Authentication via Pop Noises
    Jiang, Peipei
    Wang, Qian
    Lin, Xiu
    Zhou, Man
    Ding, Wenbing
    Wang, Cong
    Shen, Chao
    Li, Qi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1702 - 1718
  • [10] Li L., 2022, J. Commun., V49, P209