浏览全部资源
扫码关注微信
1. 郑州大学网络空间安全学院,河南 郑州 450001
2. 河南省网络密码技术重点实验室,河南 郑州 450001
3. 郑州市区块链与数据智能重点实验室,河南 郑州 450001
[ "佘维(1977− ),男,湖南常德人,博士,郑州大学教授、博士生导师,主要研究方向为区块链技术、信息安全、智能系统" ]
[ "荣欣鹏(1998− ),男,山东东营人,郑州大学硕士生,主要研究方向为区块链技术、信息安全" ]
[ "刘炜(1981− ),男,河南安阳人,博士,郑州大学副教授、博士生导师,主要研究方向为区块链技术、信息安全、智慧医疗" ]
[ "田钊(1985− ),男,河南荥阳人,博士,郑州大学讲师、硕士生导师,主要研究方向为区块链技术、信息安全、智能交通" ]
网络出版日期:2022-10,
纸质出版日期:2022-10-25
移动端阅览
佘维, 荣欣鹏, 刘炜, 等. 基于马尔可夫链的生成式区块链隐蔽通信模型[J]. 通信学报, 2022,43(10):121-132.
Wei SHE, Xinpeng RONG, Wei LIU, et al. Generative blockchain-based covert communication model based on Markov chain[J]. Journal on communications, 2022, 43(10): 121-132.
佘维, 荣欣鹏, 刘炜, 等. 基于马尔可夫链的生成式区块链隐蔽通信模型[J]. 通信学报, 2022,43(10):121-132. DOI: 10.11959/j.issn.1000-436x.2022194.
Wei SHE, Xinpeng RONG, Wei LIU, et al. Generative blockchain-based covert communication model based on Markov chain[J]. Journal on communications, 2022, 43(10): 121-132. DOI: 10.11959/j.issn.1000-436x.2022194.
摘 要:为了解决目前区块链隐蔽通信中信道构建风险高、信息交叉、隐蔽性不足等问题,提出了一种基于马尔可夫链的生成式区块链隐蔽通信模型。首先,发送方使用文本数据集获取候选单词集并进行马尔可夫模型训练,获得转移概率矩阵,并生成哈夫曼树集合;随后,对需要传输的秘密信息二进制流进行迭代式哈夫曼解码,以获得一组符合正常语言与语义特征、可读性强的载密信息语句,利用生成式隐写方法完成秘密信息嵌入;然后,将该载密信息进行环签名后,作为正常交易发布到区块链网络中并完成打包和出块;最后,接收方利用相同的文本数据集获取转移概率权值哈夫曼树,逆向操作获得秘密信息二进制流。实验结果表明,相较于目前的同类模型,所提模型可进一步提高嵌入强度和时间效率,降低隐蔽信道构建风险,避免信息交叉,提升隐蔽性。
To solve the problems of high channel construction risk
information crossover
and insufficient concealment in the blockchain covert communication
a generative blockchain-based covert communication model based on Markov chain was proposed.First
the text data set was used by sender to obtain the candidate words set and trained the Markov model to obtain the transition probability matrix
generated the Huffman tree set.Secret message to be transmitted was performed iterative Huffman decoding on the binary stream to obtain a set of highly readable carring-secret message statements that conformed to normal language and semantic characteristics
a generative steganography was used to complete secret message embedding.Then
the carring-secret message was ring-signed and published to the blockchain as a normal transaction packing and block generation were completed in the network.Finally
the same text data set was used by the receiver to obtain the Huffman tree of transition probability weights
the binary stream of secret message was obtained by reverse operation.Simulation results demonstrate that
compares with the current similar models
the proposed model can further improve the embedding strength and time efficiency
reduce the risk of covert channel construction
avoid information crossover
and improve the concealment.
李彦峰 , 丁丽萍 , 吴敬征 , 等 . 网络隐蔽信道关键技术研究综述 [J ] . 软件学报 , 2019 , 30 ( 8 ): 2470 - 2490 .
LI Y F , DING L P , WU J Z , et al . Survey on key issues in networks covert channel [J ] . Journal of Software , 2019 , 30 ( 8 ): 2470 - 2490 .
BERNSTEIN D J , HENINGER N , LOU P , et al . Post-quantum RSA [C ] // Proceedings of 2017 International Workshop on Post-Quantum Cryptography . Berlin:Springer , 2017 : 311 - 329 .
BERNSTEIN D J , BREITNER J , GENKIN D , et al . Sliding right into disaster:left-to-right sliding windows leak [C ] // Proceedings of International Conference on Cryptographic Hardware and Embedded Systems . Berlin:Springer , 2017 : 555 - 576 .
PETITCOLAS F A P , ANDERSON R J , KUHN M G . Information hiding-a survey [J ] . Proceedings of the IEEE , 1999 , 87 ( 7 ): 1062 - 1078 .
刘敖迪 , 杜学绘 , 王娜 , 等 . 区块链技术及其在信息安全领域的研究进展 [J ] . 软件学报 , 2018 , 29 ( 7 ): 2092 - 2115 .
LIU A D , DU X H , WANG N , et al . Research progress of blockchain technology and its application in information security [J ] . Journal of Software , 2018 , 29 ( 7 ): 2092 - 2115 .
PARTALA J . Provably secure covert communication on blockchain [J ] . Cryptography , 2018 , 2 ( 3 ): 18 .
宋上 , 彭伟 . BLOCCE+:一种改进的基于区块链的隐蔽通信方法 [J ] . 重庆理工大学学报(自然科学) , 2020 , 34 ( 9 ): 238 - 244 .
SONG S , PENG W . BLOCCE +:an improved blockchain-based covert communication approach [J ] . Journal of Chongqing University of Technology (Natural Science) , 2020 , 34 ( 9 ): 238 - 244 .
ZHANG L J , ZHANG Z J , WANG W Z , et al . A covert communication method using special bitcoin addresses generated by vanitygen [J ] . Computers,Materials & Continua , 2020 , 65 ( 1 ): 597 - 616 .
GUO Z Z , SHI L C , XU M Z , et al . MRCC:a practical covert channel over monero with provable security [J ] . IEEE Access , 2021 , 9 : 31816 - 31825 .
蓝怡琴 , 张方国 , 田海博 . 利用门罗币实现隐蔽通信 [J ] . 西安电子科技大学学报 , 2020 , 47 ( 5 ): 19 - 27 .
LAN Y Q , ZHANG F G , TIAN H B . Using Monero to realize covert communication [J ] . Journal of Xidian University , 2020 , 47 ( 5 ): 19 - 27 .
SHE W , HUO L J , TIAN Z , et al . A double steganography model combining blockchain and interplanetary file system [J ] . Peer-to-Peer Networking and Applications , 2021 , 14 ( 5 ): 3029 - 3042 .
佘维 , 霍丽娟 , 田钊 , 等 . 面向纯文本信息隐藏的区块链隐蔽通信模型 [J ] . 计算机科学 , 2022 , 49 ( 1 ): 345 - 352 .
SHE W , HUO L J , TIAN Z , et al . Blockchain covert communication model for plain text information hiding [J ] . Computer Science , 2022 , 49 ( 1 ): 345 - 352 .
佘维 , 霍丽娟 , 刘炜 , 等 . 一种可隐藏敏感文档和发送者身份的区块链隐蔽通信模型 [J ] . 电子学报 , 2022 , 50 ( 4 ): 1002 - 1013 .
SHE W , HUO L J , LIU W , et al . A blockchain-based covert communication model for hiding sensitive documents and sender identity [J ] . Acta Electronica Sinica , 2022 , 50 ( 4 ): 1002 - 1013 .
姜鹏坤 , 张问银 , 王九如 , 等 . 基于正常交易掩盖下的区块链隐蔽通信方案 [J ] . 网络与信息安全学报 , 2022 , 8 ( 4 ): 77 - 86 .
JIANG P K , ZHANG W Y , WANG J R , et al . Blockchain covert communication scheme based on the cover of normal transactions [J ] . Chinese Journal of Network and Information Security , 2022 , 8 ( 4 ): 77 - 86 .
DAI W H , YU Y , DAI Y H , et al . Text steganography system using Markov chain source model and DES algorithm [J ] . Journal of Software , 2010 , 5 ( 7 ): 785 - 792 .
RIVEST R L , SHAMIR A , TAUMAN Y . How to leak a secret [M ] . Berlin : Springer , 2001 .
马春光 , 安婧 , 毕伟 , 等 . 区块链中的智能合约 [J ] . 信息网络安全 , 2018 ( 11 ): 8 - 17 .
MA C G , AN J , BI W , et al . Smart contract in blockchain [J ] . Netinfo Security , 2018 ( 11 ): 8 - 17 .
KUZLU M , PIPATTANASOMPORN M , GURSES L , et al . Performance analysis of a hyperledger fabric blockchain framework:throughput,latency and scalability [C ] // Proceedings of IEEE International Conference on Blockchain (Blockchain) . Piscataway:IEEE Press , 2019 : 536 - 540 .
袁勇 , 王飞跃 . 区块链技术发展现状与展望 [J ] . 自动化学报 , 2016 , 42 ( 4 ): 481 - 494 .
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends [J ] . Acta Automatica Sinica , 2016 , 42 ( 4 ): 481 - 494 .
佘维 , 荣欣鹏 , 贾骏 , 等 . 区块链隐蔽通信的构建技术及检测方法研究综述 [J ] . 郑州大学学报(理学版) , 2022 , 54 ( 6 ): 1 - 11 .
SHE W , RONG X P , JIA J , et al . Technology development and research status of blockchain covert communication and detection methods [J ] . Journal of Zhengzhou University (Natural Science Edition) , 2022 , 54 ( 6 ): 1 - 11 .
OLEKH T , GOGUNSKII V . Use of discrete and continuous Markov chains for system absorbing states [C ] // Proceedings of IEEE International Conference on Advanced Trends in Information Theory . Piscataway:IEEE Press , 2019 : 518 - 521 .
LI F , XU S Y , SHEN H , et al . Extended dissipativity-based control for hidden Markov jump singularly perturbed systems subject to general probabilities [J ] . IEEE Transactions on Systems,Man,and Cybernetics:Systems , 2021 , 51 ( 9 ): 5752 - 5761 .
康慧娴 , 易标 , 吴汉舟 . 文本隐写及隐写分析综述 [J ] . 应用科学学报 , 2021 , 39 ( 6 ): 923 - 938 .
KANG H X , YI B , WU H Z . Recent advances in text steganography and steganalysis [J ] . Journal of Applied Sciences , 2021 , 39 ( 6 ): 923 - 938 .
ARSHAD R , SALEEM A , KHAN D . Performance comparison of huffman coding and double huffman coding [C ] // Proceedings of Sixth International Conference on Innovative Computing Technology (INTECH) . Piscataway:IEEE Press , 2016 : 361 - 364 .
GO A , BHAYANI R , HUANG L . Twitter sentiment classification using distant supervision [R ] . CS224N Project Report , 2009 .
HOUMANSADR A , BORISOV N . CoCo:coding-based covert timing channels for network flows [C ] // Proceedings of the Information Hiding . Berlin:Springer , 2011 : 314 - 328 .
0
浏览量
921
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构