Computer Science ›› 2022, Vol. 49 ›› Issue (1): 345-352.doi: 10.11896/jsjkx.201000112
• Information Security • Previous Articles Next Articles
SHE Wei1,2,3, HUO Li-juan1,3, TIAN Zhao1,3, LIU Wei1,2,3, SONG Xuan1,3
CLC Number:
[1]NAHARUDDIN A,WIBAWA A D,SUMPENO S.A High Capacity and Imperceptible Text Steganography Using Binary Di-git Mapping on ASCII Characters[C]//2018 International Seminar on Intelligent Technology and Its Applications (ISITIA).Bali,Indonesia,2018:287-292. [2]KATARIA S,KUMAR T,SINGH K,et al.ECR (encryptionwith cover text and reordering) based text steganography[C]//2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).Shimla,2013:612-616. [3]WANG K,GAO Q.A Coverless Plain Text SteganographyBased on Character Features[C]//IEEE Access.2019:95665-95676. [4]WU G H,GONG L C,YUAN L F,et al.Review of information hiding on Chinese text[J].Journal on Communications,2019,40(9):145-156. [5]ZHOU J J,YANG Z,NIU X X.Research on the detecting algorithm of text document information hiding[J].Journal on Communications,2004,25(12):97-101. [6]WANG Y J,WU J Z,ZENG H T,et al.Covert channel research[J].Journal of Software,2010,21(9):2262-2288. [7]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].https://bitcoin.org/bitcoin.pdf. [8]ZHENG Z,XIE S,DAI H,et al.An Overview of BlockchainTechnology:Architecture,Consensus,and Future Trends[C]//IEEE International Congress on Big Data.IEEE,2017. [9]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474. [10]PARTALA J.Provably Secure Covert Communication on Blockchain[J].Cryptography,2018. [11]TIAN J,GOU G,LIU C,et al.DLchain:A Covert Channel over Blockchain Based on Dynamic Labels[C]//Information and Communications Security.Cham:Springer,2019:814-830. [12]FIONOV A.Exploring Covert Channels in Bitcoin Transactions[C]//2019 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON).Novosibirsk,Russia,2019:59-64. [13]LI Y F,DING L P,WU J Z,et al.Research on a new network covert channel model in blockchain environment[J].Journal on Communications,2019,40(5):67-78. [14]CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303. [15]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//IEEE European Symposium on Security and Privacy Workshops.IEEE,2017:1-3. [16]SHEN X,PEI Q Q,LIU X F.Survey of blockchain[J].Chinese Journal of Network and Information Security,2016,2(11):11-20. [17]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].ACTA Automatica Sinica,2016,42(4):481-494. [18]LAMPSON B W.A note on the confinement problem[M].Communications of the ACM,1973,16(10):613-615. [19]WENDZEL S,ZANDER S,FECHNER B,et al.Pattern-based survey and categorization of network covert channel techniques[J].ACM Computing Surveys,2015,47(3):1-26. [20]KAMARUDDIN N S,KAMSIN A,POR L Y,et al.A review of text watermarking:theory,methods and applications[J].IEEE Access,2018,6(1):8011-8028. [21]QI W F,LI X L,YANG B,et al.Document watermarkingscheme for information tracking[J].Journal on Communications,2008,29(10):183-190. [22]JIANG C X,CHEN X W,LI Z.Robust text watermarking based on significant components[J].Acta Automatica Sinica,2010,36(9):1250-1256. [23]CHEN Y N,LI Q M,LV C X,et al.Robust Text Watermarking Based on Significant Components[J].Cyberspace Security,2019,10(5):88-96. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|