A Derivative Matrix-Based Covert Communication Method in Blockchain
نویسندگان
چکیده
The data in the blockchain cannot be tampered with and users are anonymous, which enables to a natural carrier for covert communication. However, existing methods of communication suffer from predefined channel structure, capacity single transaction is not high, fixed behaviors will lower concealment channel. Therefore, this paper proposes derivation matrix-based method blockchain. It uses dual-key derive two types addresses then constructs an address matrix by dividing into multiple layers make full use redundancy addresses. Subsequently, solve problem lack caused behaviors, divide rectangular square blocks overlapping regions encrypt different sequentially match better those real Further, linear congruence algorithm used generate random sequence, provides order encryption, thus enhances security encryption algorithm. Experimental results show that can effectively reduce abnormal while ensuring transmission efficiency.
منابع مشابه
Study on Airspace Covert Communication Algorithm of Covert Communication System
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...
متن کاملA VoIP-based Covert Communication Scheme Using Compounded Pseudorandom Sequence
Steganography over real-time streaming media is a novel and promising research subject. This paper performs steganography over a typical streaming media, Voice over IP (VoIP), and suggests a new covert communication scheme for interactive secret messages. To resist the statistical detection, a sophisticated compounded pseudorandom sequence, produced by a compounded pseudorandom number generator...
متن کاملCovert Communication in Mobile Applications
This paper studies communication patterns in mobile applications. Our analysis shows that 63% of the external communication made by top-popular free Android applications from Google Play has no effect on the user-observable application functionality. To detect such covert communication in an efficient manner, we propose a highly precise and scalable static analysis technique: it achieves 93% pr...
متن کاملCovert Communication through Executables
This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after ...
متن کاملBehavioral Mimicry Covert Communication
Covert communication refers to the process of communicating data through a channel that is neither designed, nor intended to transfer information. Traditionally, covert channels are considered as security threats in computer systems and a great deal of attention has been given to countermeasures for covert communication schemes. The evolution of computer networks led the communication community...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2023
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2023.034915