Computer Science ›› 2022, Vol. 49 ›› Issue (1): 345-352.doi: 10.11896/jsjkx.201000112

• Information Security • Previous Articles     Next Articles

Blockchain Covert Communication Model for Plain Text Information Hiding

SHE Wei1,2,3, HUO Li-juan1,3, TIAN Zhao1,3, LIU Wei1,2,3, SONG Xuan1,3   

  1. 1 School of Software,Zhengzhou University,Zhengzhou 450000,China
    2 Henan Collaborative Innovation Center for Internet Medical and Health Services,Zhengzhou University,Zhengzhou 450000,China
    3 Hanwei Internet of Things Research Institute,Zhengzhou University,Zhengzhou 450000,China
  • Received:2020-10-21 Revised:2021-02-04 Online:2022-01-15 Published:2022-01-18
  • About author:SHE Wei,born in 1977,Ph.D,professor,doctorial supervisor,is a member of China Computer Federation.His main research interests include blockchain technology,information security and trusted distributed system.
    TIAN Zhao,born in 1985,Ph.D,lectu-rer,is a member of China Computer Fe-deration.His main interests include blockchain technology and trusted distributed system.
  • Supported by:
    National Key Research and Development Project(2018YFB1201403),Program for Science&Technology Innovation Talents in Universities of Henan Province(21HASTIT031),Major Public Welfare Project of Henan Province (201300210300),Training Plan for Young Backbone Teachers of Colleges and Universities in Henan(2019GGJS018),Key Scientific Research Project of Colleges and Universities in Henan Province(20A520035) and Collaborative Innovation Major Project of Zhengzhou(20XTZX06013).

Abstract: Plain text information hiding is vulnerable to active attacks such as deletion and change,which makes the embedded secret information damaged.Blockchain is characterized by non-tampering,non-forgery,anonymity and node information synchronization,making it a natural platform for building hidden channels and ensuring that secret information is not destroyed.This paper proposes the blockchain covert communication model for plain text information hiding.Firstly,the location of the embedded secret information is determined according to the partial order relation.The sender uses the space method to embed the secret information into the plain text content.Then,a scenario of hidden communication in the blockchain network is constructed,and the sender publishes the transaction containing the plain text content to the blockchain network.Finally,after the transaction is packaged and a chain block is formed,any node can obtain the file as the receiver,but only the trusted party can extract the secret information through the inverse process of the embedded algorithm.Experimental comparison and analysis show that the model has better anti-detection,robustness,security and higher hiding capacity.More importantly,the blockchain as a channel enables the identity of the trusted party to be hidden,and the concealment of the communication process is doubly guaranteed.

Key words: Blockchain, Covert communication, Information hiding, Plain text

CLC Number: 

  • TP309
[1]NAHARUDDIN A,WIBAWA A D,SUMPENO S.A High Capacity and Imperceptible Text Steganography Using Binary Di-git Mapping on ASCII Characters[C]//2018 International Seminar on Intelligent Technology and Its Applications (ISITIA).Bali,Indonesia,2018:287-292.
[2]KATARIA S,KUMAR T,SINGH K,et al.ECR (encryptionwith cover text and reordering) based text steganography[C]//2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).Shimla,2013:612-616.
[3]WANG K,GAO Q.A Coverless Plain Text SteganographyBased on Character Features[C]//IEEE Access.2019:95665-95676.
[4]WU G H,GONG L C,YUAN L F,et al.Review of information hiding on Chinese text[J].Journal on Communications,2019,40(9):145-156.
[5]ZHOU J J,YANG Z,NIU X X.Research on the detecting algorithm of text document information hiding[J].Journal on Communications,2004,25(12):97-101.
[6]WANG Y J,WU J Z,ZENG H T,et al.Covert channel research[J].Journal of Software,2010,21(9):2262-2288.
[7]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].https://bitcoin.org/bitcoin.pdf.
[8]ZHENG Z,XIE S,DAI H,et al.An Overview of BlockchainTechnology:Architecture,Consensus,and Future Trends[C]//IEEE International Congress on Big Data.IEEE,2017.
[9]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474.
[10]PARTALA J.Provably Secure Covert Communication on Blockchain[J].Cryptography,2018.
[11]TIAN J,GOU G,LIU C,et al.DLchain:A Covert Channel over Blockchain Based on Dynamic Labels[C]//Information and Communications Security.Cham:Springer,2019:814-830.
[12]FIONOV A.Exploring Covert Channels in Bitcoin Transactions[C]//2019 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON).Novosibirsk,Russia,2019:59-64.
[13]LI Y F,DING L P,WU J Z,et al.Research on a new network covert channel model in blockchain environment[J].Journal on Communications,2019,40(5):67-78.
[14]CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303.
[15]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//IEEE European Symposium on Security and Privacy Workshops.IEEE,2017:1-3.
[16]SHEN X,PEI Q Q,LIU X F.Survey of blockchain[J].Chinese Journal of Network and Information Security,2016,2(11):11-20.
[17]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].ACTA Automatica Sinica,2016,42(4):481-494.
[18]LAMPSON B W.A note on the confinement problem[M].Communications of the ACM,1973,16(10):613-615.
[19]WENDZEL S,ZANDER S,FECHNER B,et al.Pattern-based survey and categorization of network covert channel techniques[J].ACM Computing Surveys,2015,47(3):1-26.
[20]KAMARUDDIN N S,KAMSIN A,POR L Y,et al.A review of text watermarking:theory,methods and applications[J].IEEE Access,2018,6(1):8011-8028.
[21]QI W F,LI X L,YANG B,et al.Document watermarkingscheme for information tracking[J].Journal on Communications,2008,29(10):183-190.
[22]JIANG C X,CHEN X W,LI Z.Robust text watermarking based on significant components[J].Acta Automatica Sinica,2010,36(9):1250-1256.
[23]CHEN Y N,LI Q M,LV C X,et al.Robust Text Watermarking Based on Significant Components[J].Cyberspace Security,2019,10(5):88-96.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[3] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[4] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[5] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[6] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[9] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[12] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[13] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[14] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[15] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!