计算机科学 ›› 2022, Vol. 49 ›› Issue (1): 345-352.doi: 10.11896/jsjkx.201000112

• 信息安全 • 上一篇    下一篇

面向纯文本信息隐藏的区块链隐蔽通信模型

佘维1,2,3, 霍丽娟1,3, 田钊1,3, 刘炜1,2,3, 宋轩1,3   

  1. 1 郑州大学软件学院 郑州450000
    2 郑州大学互联网医疗与健康服务河南省协同创新中心 郑州450000
    3 郑州大学汉威物联网研究院 郑州450000
  • 收稿日期:2020-10-21 修回日期:2021-02-04 出版日期:2022-01-15 发布日期:2022-01-18
  • 通讯作者: 田钊(tianzhao@zzu.edu.cn)
  • 作者简介:wshe@zzu.edu.cn
  • 基金资助:
    国家重点研发计划 (2018YFB1201403);河南省高校科技创新人才支持计划(21HASTIT031);河南省重大公益专项(201300210300);河南省高等学校青年骨干教师培养计划(2019GGJS018);河南省高等学校重点科研项目(20A520035);郑州市协同创新重大专项(20XTZX06013)

Blockchain Covert Communication Model for Plain Text Information Hiding

SHE Wei1,2,3, HUO Li-juan1,3, TIAN Zhao1,3, LIU Wei1,2,3, SONG Xuan1,3   

  1. 1 School of Software,Zhengzhou University,Zhengzhou 450000,China
    2 Henan Collaborative Innovation Center for Internet Medical and Health Services,Zhengzhou University,Zhengzhou 450000,China
    3 Hanwei Internet of Things Research Institute,Zhengzhou University,Zhengzhou 450000,China
  • Received:2020-10-21 Revised:2021-02-04 Online:2022-01-15 Published:2022-01-18
  • About author:SHE Wei,born in 1977,Ph.D,professor,doctorial supervisor,is a member of China Computer Federation.His main research interests include blockchain technology,information security and trusted distributed system.
    TIAN Zhao,born in 1985,Ph.D,lectu-rer,is a member of China Computer Fe-deration.His main interests include blockchain technology and trusted distributed system.
  • Supported by:
    National Key Research and Development Project(2018YFB1201403),Program for Science&Technology Innovation Talents in Universities of Henan Province(21HASTIT031),Major Public Welfare Project of Henan Province (201300210300),Training Plan for Young Backbone Teachers of Colleges and Universities in Henan(2019GGJS018),Key Scientific Research Project of Colleges and Universities in Henan Province(20A520035) and Collaborative Innovation Major Project of Zhengzhou(20XTZX06013).

摘要: 纯文本信息隐藏容易遭受删除、更改等主动攻击,使嵌入的秘密信息遭到破坏。区块链因具有不可篡改、不可伪造、匿名性、节点信息同步等特点,成为构建隐蔽信道的天然平台,并确保秘密信息不被破坏。文中提出了一种面向纯文本信息隐藏的区块链隐蔽通信模型。首先,根据偏序关系确定嵌入秘密信息的位置,发送方使用空格法将秘密信息嵌入到纯文本内容中;然后,构建区块链网络隐蔽通信的场景,发送方将载有纯文本内容的交易发布到区块链网络上;最后,在交易打包并形成链块后,任意节点均可作为接收方获取文件,但只有受信方可以通过嵌入算法的逆过程提取出秘密信息。实验对比及分析表明,该模型具有较好的抗检测性、鲁棒性、安全性和较高的隐藏容量。更为重要的是,以区块链作为信道的方法可使受信方身份得以隐藏,通信过程的隐蔽性得到了双重保障。

关键词: 纯文本, 区块链, 信息隐藏, 隐蔽通信

Abstract: Plain text information hiding is vulnerable to active attacks such as deletion and change,which makes the embedded secret information damaged.Blockchain is characterized by non-tampering,non-forgery,anonymity and node information synchronization,making it a natural platform for building hidden channels and ensuring that secret information is not destroyed.This paper proposes the blockchain covert communication model for plain text information hiding.Firstly,the location of the embedded secret information is determined according to the partial order relation.The sender uses the space method to embed the secret information into the plain text content.Then,a scenario of hidden communication in the blockchain network is constructed,and the sender publishes the transaction containing the plain text content to the blockchain network.Finally,after the transaction is packaged and a chain block is formed,any node can obtain the file as the receiver,but only the trusted party can extract the secret information through the inverse process of the embedded algorithm.Experimental comparison and analysis show that the model has better anti-detection,robustness,security and higher hiding capacity.More importantly,the blockchain as a channel enables the identity of the trusted party to be hidden,and the concealment of the communication process is doubly guaranteed.

Key words: Blockchain, Covert communication, Information hiding, Plain text

中图分类号: 

  • TP309
[1]NAHARUDDIN A,WIBAWA A D,SUMPENO S.A High Capacity and Imperceptible Text Steganography Using Binary Di-git Mapping on ASCII Characters[C]//2018 International Seminar on Intelligent Technology and Its Applications (ISITIA).Bali,Indonesia,2018:287-292.
[2]KATARIA S,KUMAR T,SINGH K,et al.ECR (encryptionwith cover text and reordering) based text steganography[C]//2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).Shimla,2013:612-616.
[3]WANG K,GAO Q.A Coverless Plain Text SteganographyBased on Character Features[C]//IEEE Access.2019:95665-95676.
[4]WU G H,GONG L C,YUAN L F,et al.Review of information hiding on Chinese text[J].Journal on Communications,2019,40(9):145-156.
[5]ZHOU J J,YANG Z,NIU X X.Research on the detecting algorithm of text document information hiding[J].Journal on Communications,2004,25(12):97-101.
[6]WANG Y J,WU J Z,ZENG H T,et al.Covert channel research[J].Journal of Software,2010,21(9):2262-2288.
[7]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].https://bitcoin.org/bitcoin.pdf.
[8]ZHENG Z,XIE S,DAI H,et al.An Overview of BlockchainTechnology:Architecture,Consensus,and Future Trends[C]//IEEE International Congress on Big Data.IEEE,2017.
[9]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474.
[10]PARTALA J.Provably Secure Covert Communication on Blockchain[J].Cryptography,2018.
[11]TIAN J,GOU G,LIU C,et al.DLchain:A Covert Channel over Blockchain Based on Dynamic Labels[C]//Information and Communications Security.Cham:Springer,2019:814-830.
[12]FIONOV A.Exploring Covert Channels in Bitcoin Transactions[C]//2019 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON).Novosibirsk,Russia,2019:59-64.
[13]LI Y F,DING L P,WU J Z,et al.Research on a new network covert channel model in blockchain environment[J].Journal on Communications,2019,40(5):67-78.
[14]CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303.
[15]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//IEEE European Symposium on Security and Privacy Workshops.IEEE,2017:1-3.
[16]SHEN X,PEI Q Q,LIU X F.Survey of blockchain[J].Chinese Journal of Network and Information Security,2016,2(11):11-20.
[17]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].ACTA Automatica Sinica,2016,42(4):481-494.
[18]LAMPSON B W.A note on the confinement problem[M].Communications of the ACM,1973,16(10):613-615.
[19]WENDZEL S,ZANDER S,FECHNER B,et al.Pattern-based survey and categorization of network covert channel techniques[J].ACM Computing Surveys,2015,47(3):1-26.
[20]KAMARUDDIN N S,KAMSIN A,POR L Y,et al.A review of text watermarking:theory,methods and applications[J].IEEE Access,2018,6(1):8011-8028.
[21]QI W F,LI X L,YANG B,et al.Document watermarkingscheme for information tracking[J].Journal on Communications,2008,29(10):183-190.
[22]JIANG C X,CHEN X W,LI Z.Robust text watermarking based on significant components[J].Acta Automatica Sinica,2010,36(9):1250-1256.
[23]CHEN Y N,LI Q M,LV C X,et al.Robust Text Watermarking Based on Significant Components[J].Cyberspace Security,2019,10(5):88-96.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[3] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[4] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[5] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[6] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[13] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[14] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!