期刊文献+

一种支持动态标签的区块链数据隐蔽传输机制 被引量:11

Covert data transmission mechanism based on dynamic label in blockchain
在线阅读 下载PDF
导出
摘要 针对传统的区块链数据隐蔽传输方案存在隐蔽性差、信道容量低、时间成本高的问题,设计了一种将数据嵌入机制和交易筛选机制分离的新模型,提出了一种基于地址动态标签的交易筛选算法。该方案利用密钥相关的哈希运算消息认证码构造携带标签信息的特殊地址,使接收方能够高效隐蔽地从区块链账本海量数据中筛选出携带隐蔽信息的特殊交易,实现在开放式区块链环境下的数据隐蔽传输。仿真结果表明,所提方案能够在比特币真实网络中实现数据隐蔽传输。方案的隐蔽性和效率优于传统方案,具有较强的实用性。 The existing blockchain data covert transmission scheme is faced with the problems of poor concealment,small channel capacity and low efficiency.This paper designs a new model for separating the data embedding mechanism from the transaction filtering mechanism,and proposes a new filtering algorithm based on the address dynamic label.In this scheme,the HMAC algorithm is used to construct the special address label,so that the receiving party can effectively screen the special transaction carrying the concealed information from the massive data in the blockchain ledger,and realize the concealed data transmission in the open blockchain scenario.Simulation results show that the proposed scheme can realize the hidden transmission of data in the real bitcoin network.The concealment and efficiency of the scheme are better than those of the traditional scheme.
作者 司成祥 高峰 祝烈煌 巩国鹏 张璨 陈卓 李锐光 SI Chengxiang;GAO Feng;ZHU Liehuang;GONG Guopeng;ZHANG Can;CHEN Zhuo;LI Ruiguang(National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC),Beijing 100029,China;School of Computer Science,Beijing Institute of Technology,Beijing 100081,China;Linyi Financial Big Data LTD,Linyi 276000,China)
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2020年第5期94-102,共9页 Journal of Xidian University
基金 国家自然科学联合基金(U1836212)。
关键词 区块链 信息隐藏 密钥相关的哈希运算消息认证码 动态标签 隐写术 blockchain information hiding hash-based message authentication code dynamic labels steganography
作者简介 司成祥(1982-),男,高级工程师,E-mail:sichengxiang@cert.org.cn;通信作者:祝烈煌(1976-),男,教授,E-mail:liehuangz@bit.edu.cn。
  • 相关文献

参考文献3

二级参考文献18

  • 1周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 2陈波,谭运猛,吴世忠.信息隐藏技术综述[J].计算机与数字工程,2005,33(2):21-23. 被引量:38
  • 3Provos N,Honeyman P.Hide and Seek:an Introduction to Steganography[J].IEEE Security & Privacy,2003,1(3):32-44.
  • 4Wang H,Wang S.Cyber Warfare:Steganography vs Steganalysis[J].Communications of the ACM,2004,47(10):76-82.
  • 5Cachin C.An Information-Theoretic Model for Steganography[C]//Information Hiding,Second International Workshop,IH98.Portland:Proceedings,1998:307-318.
  • 6Moulin P,O'Sullivan J A.Information-Theoretic Analysis of Information Hiding[J].IEEE Trans on Information Theory,2003,49(3):563-593.
  • 7Fridrich J,Rui D.Secure Stegangraphic Methods for Palette Images:Vol 1 768[C]//The 3rd Information Hiding Workshop,Lecture in Computer Science.Berlin:Springer-Verlag,2000:47-60.Zhou Wenjin,Fan Mingyu,Wang Guangwei.An Information Hiding Method to LSB of BMP Images[J].China Information Security,2005,7:253-255.
  • 8Dittmann J,Stabenau M,Steinmetz R.Robust MPEG Video Watermarking Technologies[C]//Proceedings of the Sixth ACM International Conference on Multimedia.Bristol:ACM,1998:71-80.
  • 9Xu Changyong,Ping Xijian,Zhang Tao.Steganography in Compressed Video Stream[C]//Proceedings of the First International Conference on Innovative Computing,Information and Control (ICICIC'06).Washington:IEEE Computer Society,2006:269-272.
  • 10Dittmann J,Vogel T,Hillert R.Design and Evaluation of Steganography for Voice-over-IP[C]//Circuits and Systems,ISCAS 2006.Island of Kos:IEEE CAS Society,2006:4-7.

共引文献284

同被引文献123

引证文献11

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部