Blockchain for steganography: advantages, new algorithms and open challenges

Steganography is a solution for covert communication and blockchain is a p2p network for data transmission, so the benefits of blockchain can be used in steganography. In this paper, we discuss the advantages of blockchain in steganography, which include the ability to embed hidden data without manual change in the original data, as well as the readiness of the blockchain platform for data transmission and storage, which eliminates the need for the Steganographer to design and implement a new platform for data transmission and storage. We have proposed two algorithms for steganography in blockchain, the first one is a high-capacity algorithm for the key and the steganography algorithm exchange and switching, and the second one is a medium-capacity algorithm for embedding hidden data. Also, by reviewing the previous three steganography schemes in blockchain, we have examined their drawback and have showed that none of them are practical schemes for steganography in blockchain. Then, we have explained the challenges of steganography in blockchain from the steganographers and steganalyzers point of view. Keywords— Steganography, Blockchain, Bitcoin, Transaction Address, Hierarchical Deterministic Wallets

[1]  E. Felten,et al.  Bitcoin and Cryptocurrency Technologies: a , 2022 .

[2]  Juha Partala,et al.  Provably Secure Covert Communication on Blockchain , 2018, Cryptogr..

[3]  Said Esmail El-Khamy,et al.  A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption , 2016, Multimedia Tools and Applications.

[4]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[5]  Yang Xu,et al.  Towards Secure Network Computing Services for Lightweight Clients Using Blockchain , 2018, Wirel. Commun. Mob. Comput..

[6]  Ramadhan J. Mstafa,et al.  A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes , 2015, Multimedia Tools and Applications.

[7]  Zhang Zhijie,et al.  A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen , 2020, Computers, Materials & Continua.

[8]  Chin-Chen Chang,et al.  Blockchain based searchable encryption for electronic health record sharing , 2019, Future Gener. Comput. Syst..

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[11]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[12]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[13]  Guorui Feng,et al.  Broadcasting Steganography in the Blockchain , 2019, IWDW.

[14]  Eko Hari Rachmawanto,et al.  Secure Image Steganography Algorithm Based on DCT with OTP Encryption , 2017 .

[15]  Laura Ricci,et al.  Blockchain Based Access Control , 2017, DAIS.

[16]  Feng Hao,et al.  A Smart Contract for Boardroom Voting with Maximum Voter Privacy , 2017, IACR Cryptol. ePrint Arch..