Broadcasting Steganography in the Blockchain
- 49 Downloads
Conventional steganography embeds secret data into an innocent cover object such as image and video. The resulting stego object will be sent to the desired receiver via an insecure channel. Though the channel monitor cannot distinguish between normal objects and objects containing hidden information, he has the ability to intercept and alter the objects so as to break down the covert communication. It inspires us to introduce new steganography in Blockchain in order to overcome the aforementioned problem since an attacker cannot tamper Blockchain data once a block was generated, meaning that, a receiver will always be able to fully retrieve the secret data with the secret key. For the proposed work, the miner serves as the steganographer, who embeds secret data into the transactions within a block during the process of generating the block. To secure the data embedding process within a block, we choose a part of transactions in a block according to a secret key, and embed the secret data by repeatable-address arrangement. Our analysis demonstrates that, it is difficult for an attacker to extract the embedded data. Since the miner collects normal transactions for generating a block and does not generate abnormal transactions, the data embedding process will not arouse suspicion, providing a high level of security.
KeywordsSteganography Blockchain Bitcoin Behavior
This work was partly supported by the National Natural Science Foundation of China (NSFC) (U1636206, 61525203, and 61902235), the Shanghai Institute for Advanced Communication and Data Science, and the Natural Science Foundation of Shanghai (19ZR1419000).
- 1.Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)Google Scholar
- 3.Wu, H., Wang, W., Dong, J., Wang, H.: New graph-theoretic approach to social steganography. In: Proceedings of the IS&T Electronic Imaging, Media Watermarking, Security and Forensics, pp. 539-1–539-7(7) (2019)Google Scholar
- 5.Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74124-4_21CrossRefGoogle Scholar
- 6.Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
- 7.Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harv. Bus. Rev. 95(1), 118–127 (2017)Google Scholar
- 8.Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3) (2018). 18 pagesGoogle Scholar
- 9.Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview (2018). https://doi.org/10.6028/NIST.IR.8202
- 12.Bakar, N., Rosbi, S., Uzaki, K.: Cryptocurrency framework diagnostics from islamic finance perspective: a new insight of bitcoin system transaction. Int. J. Manage. Sci. Bus. Adm. 4(1), 19–28 (2017)Google Scholar