Advertisement

Broadcasting Steganography in the Blockchain

  • Mengtian Xu
  • Hanzhou WuEmail author
  • Guorui Feng
  • Xinpeng Zhang
  • Feng Ding
Conference paper
  • 49 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12022)

Abstract

Conventional steganography embeds secret data into an innocent cover object such as image and video. The resulting stego object will be sent to the desired receiver via an insecure channel. Though the channel monitor cannot distinguish between normal objects and objects containing hidden information, he has the ability to intercept and alter the objects so as to break down the covert communication. It inspires us to introduce new steganography in Blockchain in order to overcome the aforementioned problem since an attacker cannot tamper Blockchain data once a block was generated, meaning that, a receiver will always be able to fully retrieve the secret data with the secret key. For the proposed work, the miner serves as the steganographer, who embeds secret data into the transactions within a block during the process of generating the block. To secure the data embedding process within a block, we choose a part of transactions in a block according to a secret key, and embed the secret data by repeatable-address arrangement. Our analysis demonstrates that, it is difficult for an attacker to extract the embedded data. Since the miner collects normal transactions for generating a block and does not generate abnormal transactions, the data embedding process will not arouse suspicion, providing a high level of security.

Keywords

Steganography Blockchain Bitcoin Behavior 

Notes

Acknowledgement

This work was partly supported by the National Natural Science Foundation of China (NSFC) (U1636206, 61525203, and 61902235), the Shanghai Institute for Advanced Communication and Data Science, and the Natural Science Foundation of Shanghai (19ZR1419000).

References

  1. 1.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)Google Scholar
  2. 2.
    Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)CrossRefGoogle Scholar
  3. 3.
    Wu, H., Wang, W., Dong, J., Wang, H.: New graph-theoretic approach to social steganography. In: Proceedings of the IS&T Electronic Imaging, Media Watermarking, Security and Forensics, pp. 539-1–539-7(7) (2019)Google Scholar
  4. 4.
    Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24624-4_12CrossRefGoogle Scholar
  5. 5.
    Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74124-4_21CrossRefGoogle Scholar
  6. 6.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
  7. 7.
    Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harv. Bus. Rev. 95(1), 118–127 (2017)Google Scholar
  8. 8.
    Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3) (2018). 18 pagesGoogle Scholar
  9. 9.
    Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview (2018).  https://doi.org/10.6028/NIST.IR.8202
  10. 10.
    Belotti, M., Božić, N., Pujolle, G., Secci, S.: A vademecum on blockchain technologies: when, which and how. IEEE Commun. Surv. Tutor. 21(4), 3796–3838 (2019)CrossRefGoogle Scholar
  11. 11.
    Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)CrossRefGoogle Scholar
  12. 12.
    Bakar, N., Rosbi, S., Uzaki, K.: Cryptocurrency framework diagnostics from islamic finance perspective: a new insight of bitcoin system transaction. Int. J. Manage. Sci. Bus. Adm. 4(1), 19–28 (2017)Google Scholar
  13. 13.
    Jiao, Y., Wang, P., Niyato, D., Suankaewmanee, K.: Auction mechanisms in cloud/fog computing resource allocation for public blockchain networks. IEEE Trans. Parallel Distrib. Syst. 30(9), 1975–1989 (2019)CrossRefGoogle Scholar
  14. 14.
    Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRefGoogle Scholar
  15. 15.
    Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Mengtian Xu
    • 1
  • Hanzhou Wu
    • 1
    Email author
  • Guorui Feng
    • 1
  • Xinpeng Zhang
    • 1
  • Feng Ding
    • 2
  1. 1.Shanghai UniversityShanghaiChina
  2. 2.University at Albany, State University of New YorkAlbanyUSA

Personalised recommendations