A Novel Covert Communication Method Based on Bitcoin Transaction

被引:26
作者
Luo, Xiangyang [1 ,2 ]
Zhang, Pei [3 ,4 ]
Zhang, Mingliang [3 ,4 ]
Li, Hao [3 ,4 ]
Cheng, Qingfeng [3 ,4 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Henan Prov Key Lab Cyberspace Situat Awareness, Zhengzhou 450001, Peoples R China
[3] Zhengzhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
[4] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
Blockchains; Bitcoin; Indexes; Wireless communication; Encryption; Communication system security; 5G mobile communication; 5G; blockchain; covert communication; security;
D O I
10.1109/TII.2021.3100480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the global promotion and application of 5G technology, the data transmitted on the network show explosive growth, and the secure sharing of its important data is still one of the research hotspots. Steganography embeds the data that needs to be shared into digital carrier files and transmits it through open channels, which has important applications in protecting data sharing and realizing covert communication. However, the encrypted files generated by traditional steganography are susceptible to compression, cropping, geometric attacks, and man-made destruction in the process of open channel transmission, resulting in data loss, making it difficult for the receiver to correctly extract secret message. Currently, covert communication on blockchain can solve the above problems, but it also brings some new problems such as high computational complexity, low transmission efficiency, and nondetection resistance. Therefore, in this article, a covert communication method based on Bitcoin transactions is proposed. The proposed method first designs the index matrix of the transaction address. Then, the address interaction relationship that carries the secret message through the transaction index matrix is constructed. Finally, the address interaction relationship that carries the secret message is combined with the transaction amount to complete the covert transmission of the secret message on the blockchain environment. The proposed method improves the security and embedding efficiency of covert communication, reduces the number of transactions, and ensures the integrity of extracting secret message. A series of experimental results show that under the condition of ensuring the necessary security, the proposed method retains the strong robustness of the existing blockchain steganography and has strong resistance to detection.
引用
收藏
页码:2830 / 2839
页数:10
相关论文
共 18 条
  • [1] Applications of Blockchains in the Internet of Things: A Comprehensive Survey
    Ali, Muhammad Salek
    Vecchio, Massimo
    Pincheira, Miguel
    Dolui, Koustabh
    Antonelli, Fabio
    Rehmani, Mubashir Husain
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1676 - 1717
  • [2] Chain-Based Covert Data Embedding Schemes in Blockchain
    Cao, Haotian
    Yin, Hao
    Gao, Feng
    Zhang, Zijian
    Khoussainov, Bakh
    Xu, Shubin
    Zhu, Liehuang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14699 - 14707
  • [3] A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems
    Chettri, Lalit
    Bera, Rabindranath
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 16 - 32
  • [5] A Survey on Security and Privacy Issues of Bitcoin
    Conti, Mauro
    Kumar, E. Sandeep
    Lal, Chhagan
    Ruj, Sushmita
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3416 - 3452
  • [6] An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists
    Elbirt, AJ
    Yip, W
    Chetwynd, B
    Paar, C
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2001, 9 (04) : 545 - 557
  • [7] Performance Optimization for Blockchain-Enabled Distributed Network Function Virtualization Management and Orchestration
    Fu, Xiaoyuan
    Yu, F. Richard
    Wang, Jingyu
    Qi, Qi
    Liao, Jianxin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 6670 - 6679
  • [8] Hiding shares by multimedia image steganography for optimized counting-based secret sharing
    Gutub, Adnan
    Al-Ghamdi, Maimoona
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7951 - 7985
  • [9] Secure Data Storage and Recovery in Industrial Blockchain Network Environments
    Liang, Wei
    Fan, Yongkai
    Li, Kuan-Ching
    Zhang, Dafang
    Gaudiot, Jean-Luc
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6543 - 6552
  • [10] Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT
    Lu, Yunlong
    Huang, Xiaohong
    Dai, Yueyue
    Maharjan, Sabita
    Zhang, Yan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4177 - 4186