Abstract
Conventional steganography embeds secret data into an innocent cover object such as image and video. The resulting stego object will be sent to the desired receiver via an insecure channel. Though the channel monitor cannot distinguish between normal objects and objects containing hidden information, he has the ability to intercept and alter the objects so as to break down the covert communication. It inspires us to introduce new steganography in Blockchain in order to overcome the aforementioned problem since an attacker cannot tamper Blockchain data once a block was generated, meaning that, a receiver will always be able to fully retrieve the secret data with the secret key. For the proposed work, the miner serves as the steganographer, who embeds secret data into the transactions within a block during the process of generating the block. To secure the data embedding process within a block, we choose a part of transactions in a block according to a secret key, and embed the secret data by repeatable-address arrangement. Our analysis demonstrates that, it is difficult for an attacker to extract the embedded data. Since the miner collects normal transactions for generating a block and does not generate abnormal transactions, the data embedding process will not arouse suspicion, providing a high level of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)
Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)
Wu, H., Wang, W., Dong, J., Wang, H.: New graph-theoretic approach to social steganography. In: Proceedings of the IS&T Electronic Imaging, Media Watermarking, Security and Forensics, pp. 539-1–539-7(7) (2019)
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24624-4_12
Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314–327. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74124-4_21
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harv. Bus. Rev. 95(1), 118–127 (2017)
Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3) (2018). 18 pages
Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview (2018). https://doi.org/10.6028/NIST.IR.8202
Belotti, M., Božić, N., Pujolle, G., Secci, S.: A vademecum on blockchain technologies: when, which and how. IEEE Commun. Surv. Tutor. 21(4), 3796–3838 (2019)
Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)
Bakar, N., Rosbi, S., Uzaki, K.: Cryptocurrency framework diagnostics from islamic finance perspective: a new insight of bitcoin system transaction. Int. J. Manage. Sci. Bus. Adm. 4(1), 19–28 (2017)
Jiao, Y., Wang, P., Niyato, D., Suankaewmanee, K.: Auction mechanisms in cloud/fog computing resource allocation for public blockchain networks. IEEE Trans. Parallel Distrib. Syst. 30(9), 1975–1989 (2019)
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)
Acknowledgement
This work was partly supported by the National Natural Science Foundation of China (NSFC) (U1636206, 61525203, and 61902235), the Shanghai Institute for Advanced Communication and Data Science, and the Natural Science Foundation of Shanghai (19ZR1419000).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, M., Wu, H., Feng, G., Zhang, X., Ding, F. (2020). Broadcasting Steganography in the Blockchain. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-43575-2_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43574-5
Online ISBN: 978-3-030-43575-2
eBook Packages: Computer ScienceComputer Science (R0)