A Novel Covert Communication Method Based on Bitcoin Transaction

被引:0
|
作者
Luo, Xiangyang [1 ,2 ]
Zhang, Pei [3 ,4 ]
Zhang, Mingliang [3 ,4 ]
Li, Hao [3 ,4 ]
Cheng, Qingfeng [3 ,4 ]
机构
[1] Zhengzhou Inst Informat Sci & Technol, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[2] Henan Prov Key Lab Cyberspace Situat Awareness, Zhengzhou 450001, Peoples R China
[3] Zhengzhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
[4] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
Blockchains; Bitcoin; Indexes; Wireless communication; Encryption; Communication system security; 5G mobile communication; 5G; blockchain; covert communication; security;
D O I
10.1109/TII.2021.3100480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the global promotion and application of 5G technology, the data transmitted on the network show explosive growth, and the secure sharing of its important data is still one of the research hotspots. Steganography embeds the data that needs to be shared into digital carrier files and transmits it through open channels, which has important applications in protecting data sharing and realizing covert communication. However, the encrypted files generated by traditional steganography are susceptible to compression, cropping, geometric attacks, and man-made destruction in the process of open channel transmission, resulting in data loss, making it difficult for the receiver to correctly extract secret message. Currently, covert communication on blockchain can solve the above problems, but it also brings some new problems such as high computational complexity, low transmission efficiency, and nondetection resistance. Therefore, in this article, a covert communication method based on Bitcoin transactions is proposed. The proposed method first designs the index matrix of the transaction address. Then, the address interaction relationship that carries the secret message through the transaction index matrix is constructed. Finally, the address interaction relationship that carries the secret message is combined with the transaction amount to complete the covert transmission of the secret message on the blockchain environment. The proposed method improves the security and embedding efficiency of covert communication, reduces the number of transactions, and ensures the integrity of extracting secret message. A series of experimental results show that under the condition of ensuring the necessary security, the proposed method retains the strong robustness of the existing blockchain steganography and has strong resistance to detection.
引用
收藏
页码:2830 / 2839
页数:10
相关论文
共 50 条
  • [31] An Evaluation of Bitcoin Address Classification based on Transaction History Summarization
    Lin, Yu-Jing
    Wu, Po-Wei
    Hsu, Cheng-Han
    Tu, I-Ping
    Liao, Shih-wei
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 302 - 310
  • [32] A Group Covert Communication Method of Digital Currency Based on Blockchain Technology
    Zhang, Pei
    Cheng, Qingfeng
    Zhang, Mingliang
    Luo, Xiangyang
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06): : 4266 - 4276
  • [33] A Covert Communication Behavior Detection Method Based on Session Flow Aggregation
    Chen, Xing-Shu
    Chen, Jing-Han
    Shao, Guo-Lin
    Zeng, Xue-Mei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (03): : 388 - 396
  • [34] A covert communication method based on User-Generated Content sites
    Tan, Qingfeng
    Liu, Peipeng
    Shi, Jinqiao
    Wang, Xiao
    Guo, Li
    [J]. 2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011), 2011, : 1053 - 1056
  • [35] Graph-Based Covert Transaction Detection and Protection in Blockchain
    Guo, Zhenyu
    Li, Xin
    Liu, Jiamou
    Zhang, Zijian
    Li, Meng
    Hu, Jingjing
    Zhu, Liehuang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2244 - 2257
  • [36] Structure and Anonymity of the Bitcoin Transaction Graph
    Ober, Micha
    Katzenbeisser, Stefan
    Hamacher, Kay
    [J]. FUTURE INTERNET, 2013, 5 (02) : 237 - 250
  • [37] Identifying Bitcoin users by transaction behavior
    Monaco, John V.
    [J]. BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION XII, 2015, 9457
  • [38] Bitcoin as a Transaction Ledger: A Composable Treatment
    Badertscher, Christian
    Maurer, Ueli
    Tschudi, Daniel
    Zikas, Vassilis
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [39] Bitcoin as a Transaction Ledger: A Composable Treatment
    Badertscher, Christian
    Maurer, Ueli
    Tschudi, Daniel
    Zikas, Vassilis
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 324 - 356
  • [40] Abnormal Transaction Node Detection on Bitcoin
    Zhang, Yuhang
    Lu, Yanjing
    Li, Mian
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 53 - 60