Skip to main content
Log in

A double steganography model combining blockchain and interplanetary file system

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The secret information may be compromised for the lack of security and concealment in conventional covert communication. Blockchain is a suitable platform for establishing covert channels to protect the secret information, due to its features of anti-tamper, anti-forgery, anonymity, and information synchronization. However, the cost of storing large files in the blockchain is too high. To solve the above problems, we propose a double steganography model which combines blockchain and interplanetary file system (IPFS) in this paper. The model consists of two parts: image steganography and plain text steganography. In image steganography, the model embeds secret information into the original image using the least significant bit (LSB) algorithm based on RSA encryption. Then the image is stored in IPFS that returns the hash value. In plain text steganography, the model embeds the hash value into plain text files by the whitespace method based on partial order. Then those files are transmitted through blockchain network covert channels. Any node can obtain the files as the receiver. But only the trusted party can extract the secret information through the inverse process of embedding. Experimental results show that the proposed model has high performance of anti-detection and guarantees the concealment of communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Naharuddin A, Wibawa A D and Sumpeno S (2018) A high capacity and imperceptible text steganography using binary digit mapping on ASCII characters. 2018 International Seminar on Intelligent Technology and Its Applications (ISITIA), Bali, Indonesia, pp 287-292

  2. Kataria S, Kumar T, Singh K, Nehra A (2013) M S. ECR (encryption with cover text and reordering) based text steganography. 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), Shimla, pp 612-616

  3. Kusuma EJ, Indriani OR, Sari CA, Rachmawanto EH, Setiadi DRIM (2017) An imperceptible LSB image hiding on edge region using DES encryption. 2017 International conference on innovative and creative information technology (ICITech), Salatiga, pp 1-6

  4. Lampson BW (1973) A note on the confinement problem. Commun ACM 16(10):613–615

    Article  Google Scholar 

  5. Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Technical report Manubot

  6. Feng C, Yu K, Bashir AK, AI-Otaibi YD, Lu Y, Chen S, Zhang D (2020) Efficient and secure data sharing for 5G flying drones: a Blockchain-enabled approach. IEEE Netw

  7. Zheng Z, Xie S, Dai H, et al (2017) An overview of Blockchain technology: architecture, consensus, and future trends. IEEE International Congress on Big Data, IEEE

  8. Shi N, Tan L, Li W, Qi X, Yu K (2020) A Blockchain-empowered AAA scheme in the large-scale HetNet. Digital Commun Netw

  9. Sasson E B, Chiesa A, Garman C, et al. (2014) Zerocash: decentralized anonymous payments from bitcoin. 2014 IEEE Symposium on Security and Privacy, IEEE, pp 459-474

  10. Kumar R, Tripathi R (2019) Implementation of distributed file storage and access framework using IPFS and Blockchain. 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, pp 246-251

  11. Fionov A (2019) Exploring covert channels in bitcoin transactions. 2019 International Multi-Conference on Engineering. Computer and Information Sciences (SIBIRCON), Novosibirsk, Russia,pp 0059–0064

  12. Partala J (2018) Provably secure covert communication on Blockchain. Cryptography 2

  13. Tian J, Gou G, Liu C, Chen Y, Xiong G and Li Z (2019) DLchain: a covert channel over Blockchain based on dynamic labels. (eds) Information and Communications Security. Springer, Cham, 11999: 814–830

  14. Basuki AI, Rosiyadi D (2019) Joint transaction-image steganography for high capacity covert communication. 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA), Tangerang, Indonesia, pp 41-46

  15. Halpin H, Piekarska M (2017) Introduction to security and privacy on the Blockchain. IEEE European Symposium on Security and Privacy Workshops. IEEE, pp 1–3

  16. Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT, IEEE Trans Industr Inform

  17. Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and Blockchain. 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, pp 2652-2657

  18. Zheng Q, Li Y, Chen P, Dong X (2018) An innovative IPFS-based storage model for Blockchain. 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI), Santiago, pp 704-708

  19. Wendzel S, Zander S, Fechner B, Herdin C (2015) Pattern-based survey and categorization of network covert channel techniques. ACM Comput Surv 47(3):1–26

    Article  Google Scholar 

  20. Xu M, Wu H, Feng G, Zhang X, Ding F (2020) Broadcasting steganography in the Blockchain. Lect Notes Comput Sci, Springer, Cham 12022

  21. Gao F, Zhu L, Gai K, Zhang C, Liu S (2020) Achieving a covert channel over an open Blockchain network. IEEE Netw 34(2):6–13

    Article  Google Scholar 

  22. Pillai B, Mounika M, Rao PJ, Sriram P (2016) Image steganography method using K-means clustering and encryption techniques. 2016 International conference on advances in computing, communications and informatics (ICACCI), Jaipur, pp 1206-1211

  23. Zhou X, Gong W, Fu W, Jin L (2016) An improved method for LSB based color image steganography combined with cryptography. 2016 IEEE/ACIS 15th International Conference on COMPUter and Information Science (ICIS), Okayama, pp 1-4

  24. Wang K, Gao Q (2019) A coverless plain text steganography based on character features. IEEE Access 7:95665–95676

    Article  Google Scholar 

  25. Kamaruddin NS, Kamsin A, Por LY et al (2018) A review of text watermarking: theory, methods and applications. IEEE Access 6(1):8011–8028

    Article  Google Scholar 

  26. Krishnan RB, Thandra PK, Baba MS (2017) An overview of text steganography. 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, pp 1-6

Download references

Acknowledgements

This work was supported by National Key Research and Development Project No. 2018YFB1201403, Program for Science & Technology Innovation Talents in Universities of Henan Province No. 21HASTIT031, Training Plan for Young Backbone Teachers of Colleges and Universities in Henan No. 2019GGJS018, Key Scientific Research Project of Colleges and Universities in Henan Province No. 20A520035, Major Public Welfare Project of Henan Province No. 201300210300 and Scientific and Technological Research Projects in Henan Province No. 212102310039.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Liu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing

Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

She, W., Huo, L., Tian, Z. et al. A double steganography model combining blockchain and interplanetary file system. Peer-to-Peer Netw. Appl. 14, 3029–3042 (2021). https://doi.org/10.1007/s12083-021-01143-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01143-0

Keywords

Navigation