Broadcasting Steganography in the Blockchain

Conventional steganography embeds secret data into an innocent cover object such as image and video. The resulting stego object will be sent to the desired receiver via an insecure channel. Though the channel monitor cannot distinguish between normal objects and objects containing hidden information, he has the ability to intercept and alter the objects so as to break down the covert communication. It inspires us to introduce new steganography in Blockchain in order to overcome the aforementioned problem since an attacker cannot tamper Blockchain data once a block was generated, meaning that, a receiver will always be able to fully retrieve the secret data with the secret key. For the proposed work, the miner serves as the steganographer, who embeds secret data into the transactions within a block during the process of generating the block. To secure the data embedding process within a block, we choose a part of transactions in a block according to a secret key, and embed the secret data by repeatable-address arrangement. Our analysis demonstrates that, it is difficult for an attacker to extract the embedded data. Since the miner collects normal transactions for generating a block and does not generate abnormal transactions, the data embedding process will not arouse suspicion, providing a high level of security.

[1]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[2]  Nashirah Abu Bakar,et al.  Cryptocurrency Framework Diagnostics from Islamic Finance Perspective: A New Insight of Bitcoin System Transaction , 2017 .

[3]  M. Iansiti,et al.  The Truth about Blockchain , 2017 .

[4]  Juha Partala,et al.  Provably Secure Covert Communication on Blockchain , 2018, Cryptogr..

[5]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[6]  Karen Scarfone,et al.  Blockchain Technology Overview , 2018, ArXiv.

[7]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[8]  Guy Pujolle,et al.  A Vademecum on Blockchain Technologies: When, Which, and How , 2019, IEEE Communications Surveys & Tutorials.

[9]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[10]  Wei Wang,et al.  New Graph-Theoretic Approach to Social Steganography , 2019, Media Watermarking, Security, and Forensics.

[11]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[12]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[13]  Wojciech Mazurczyk,et al.  Trends in steganography , 2014, Commun. ACM.

[14]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.