计算机科学 ›› 2022, Vol. 49 ›› Issue (1): 345-352.doi: 10.11896/jsjkx.201000112
佘维1,2,3, 霍丽娟1,3, 田钊1,3, 刘炜1,2,3, 宋轩1,3
SHE Wei1,2,3, HUO Li-juan1,3, TIAN Zhao1,3, LIU Wei1,2,3, SONG Xuan1,3
摘要: 纯文本信息隐藏容易遭受删除、更改等主动攻击,使嵌入的秘密信息遭到破坏。区块链因具有不可篡改、不可伪造、匿名性、节点信息同步等特点,成为构建隐蔽信道的天然平台,并确保秘密信息不被破坏。文中提出了一种面向纯文本信息隐藏的区块链隐蔽通信模型。首先,根据偏序关系确定嵌入秘密信息的位置,发送方使用空格法将秘密信息嵌入到纯文本内容中;然后,构建区块链网络隐蔽通信的场景,发送方将载有纯文本内容的交易发布到区块链网络上;最后,在交易打包并形成链块后,任意节点均可作为接收方获取文件,但只有受信方可以通过嵌入算法的逆过程提取出秘密信息。实验对比及分析表明,该模型具有较好的抗检测性、鲁棒性、安全性和较高的隐藏容量。更为重要的是,以区块链作为信道的方法可使受信方身份得以隐藏,通信过程的隐蔽性得到了双重保障。
中图分类号:
[1]NAHARUDDIN A,WIBAWA A D,SUMPENO S.A High Capacity and Imperceptible Text Steganography Using Binary Di-git Mapping on ASCII Characters[C]//2018 International Seminar on Intelligent Technology and Its Applications (ISITIA).Bali,Indonesia,2018:287-292. [2]KATARIA S,KUMAR T,SINGH K,et al.ECR (encryptionwith cover text and reordering) based text steganography[C]//2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).Shimla,2013:612-616. [3]WANG K,GAO Q.A Coverless Plain Text SteganographyBased on Character Features[C]//IEEE Access.2019:95665-95676. [4]WU G H,GONG L C,YUAN L F,et al.Review of information hiding on Chinese text[J].Journal on Communications,2019,40(9):145-156. [5]ZHOU J J,YANG Z,NIU X X.Research on the detecting algorithm of text document information hiding[J].Journal on Communications,2004,25(12):97-101. [6]WANG Y J,WU J Z,ZENG H T,et al.Covert channel research[J].Journal of Software,2010,21(9):2262-2288. [7]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].https://bitcoin.org/bitcoin.pdf. [8]ZHENG Z,XIE S,DAI H,et al.An Overview of BlockchainTechnology:Architecture,Consensus,and Future Trends[C]//IEEE International Congress on Big Data.IEEE,2017. [9]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474. [10]PARTALA J.Provably Secure Covert Communication on Blockchain[J].Cryptography,2018. [11]TIAN J,GOU G,LIU C,et al.DLchain:A Covert Channel over Blockchain Based on Dynamic Labels[C]//Information and Communications Security.Cham:Springer,2019:814-830. [12]FIONOV A.Exploring Covert Channels in Bitcoin Transactions[C]//2019 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON).Novosibirsk,Russia,2019:59-64. [13]LI Y F,DING L P,WU J Z,et al.Research on a new network covert channel model in blockchain environment[J].Journal on Communications,2019,40(5):67-78. [14]CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303. [15]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//IEEE European Symposium on Security and Privacy Workshops.IEEE,2017:1-3. [16]SHEN X,PEI Q Q,LIU X F.Survey of blockchain[J].Chinese Journal of Network and Information Security,2016,2(11):11-20. [17]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].ACTA Automatica Sinica,2016,42(4):481-494. [18]LAMPSON B W.A note on the confinement problem[M].Communications of the ACM,1973,16(10):613-615. [19]WENDZEL S,ZANDER S,FECHNER B,et al.Pattern-based survey and categorization of network covert channel techniques[J].ACM Computing Surveys,2015,47(3):1-26. [20]KAMARUDDIN N S,KAMSIN A,POR L Y,et al.A review of text watermarking:theory,methods and applications[J].IEEE Access,2018,6(1):8011-8028. [21]QI W F,LI X L,YANG B,et al.Document watermarkingscheme for information tracking[J].Journal on Communications,2008,29(10):183-190. [22]JIANG C X,CHEN X W,LI Z.Robust text watermarking based on significant components[J].Acta Automatica Sinica,2010,36(9):1250-1256. [23]CHEN Y N,LI Q M,LV C X,et al.Robust Text Watermarking Based on Significant Components[J].Cyberspace Security,2019,10(5):88-96. |
[1] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[2] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[3] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[4] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[5] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[6] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[7] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[8] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[9] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
[10] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[11] | 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜. 区块链BFT共识算法研究进展 Research Advance on BFT Consensus Algorithms 计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011 |
[12] | 杨昕宇, 彭长根, 杨辉, 丁红发. 基于演化博弈的理性拜占庭容错共识算法 Rational PBFT Consensus Algorithm with Evolutionary Game 计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110 |
[13] | 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云. 一种面向电能量数据的联邦学习可靠性激励机制 Reliable Incentive Mechanism for Federated Learning of Electric Metering Data 计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195 |
[14] | 张潆藜, 马佳利, 刘子昂, 刘新, 周睿. 以太坊Solidity智能合约漏洞检测方法综述 Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts 计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004 |
[15] | 范家幸, 王志伟. 基于门限环签名的分级匿名表决方案 Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature 计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032 |
|