Citation: | Yuanlong CAO, Junjie LI, Kailin CHAO, et al., “Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing,” Chinese Journal of Electronics, vol. 33, no. 4, pp. 886–898, 2024 doi: 10.23919/cje.2023.00.382 |
[1] |
J. W. Huang, C. X. Zhang, and J. B. Zhang, “A multi-queue approach of energy efficient task scheduling for sensor hubs,” Chinese Journal of Electronics, vol. 29, no. 2, pp. 242–247, 2020. doi: 10.1049/cje.2020.02.001
|
[2] |
M. L. Dai, S. Y. Xu, S. J. Shao, et al., “Blockchain-based reliable fog-cloud service solution for IIoT,” Chinese Journal of Electronics, vol. 30, no. 2, pp. 359–366, 2021. doi: 10.1049/cje.2021.02.009
|
[3] |
J. W. Huang, H. Gao, S. H. Wan, et al., “AoI-aware energy control and computation offloading for industrial IoT,” Future Generation Computer Systems, vol. 139, pp. 29–37, 2023. doi: 10.1016/j.future.2022.09.007
|
[4] |
Y. Q. Liu, K. Qian, K. Wang, et al., “BCmaster: A compatible framework for comprehensively analyzing and monitoring blockchain systems in IoT,” IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22529–22546, 2022. doi: 10.1109/JIOT.2022.3182004
|
[5] |
J. Su and M. N. Jiang, “A hybrid entropy and blockchain approach for network security defense in SDN-based IIoT,” Chinese Journal of Electronics, vol. 32, no. 3, pp. 531–541, 2023. doi: 10.23919/cje.2022.00.103
|
[6] |
S. L. Xu, C. L. Guo, R. Q. Hu, et al., “Blockchain-inspired secure computation offloading in a vehicular cloud network,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14723–14740, 2022. doi: 10.1109/JIOT.2021.3054866
|
[7] |
D. X. Liu, A. Alahmadi, J. B. Ni, et al., “Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3527–3537, 2019. doi: 10.1109/TII.2019.2898900
|
[8] |
Y. J. Han, Y. W. Zhang, and S. H. Vermund, “Blockchain technology for electronic health records,” International Journal of Environmental Research and Public Health, vol. 19, no. 23, article no. 15577, 2022. doi: 10.3390/ijerph192315577
|
[9] |
M. Naz, F. A. Al-zahrani, R. Khalid, et al., “A secure data sharing platform using blockchain and interplanetary file system,” Sustainability, vol. 11, no. 24, article no. 7054, 2019. doi: 10.3390/su11247054
|
[10] |
X. J. Liu, W. B. Wang, D. Niyato, et al., “Evolutionary game for mining pool selection in blockchain networks,” IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 760–763, 2018. doi: 10.1109/LWC.2018.2820009
|
[11] |
M. Massaro, “Digital transformation in the healthcare sector through blockchain technology. insights from academic research and business developments,” Technovation, vol. 120, article no. 102386, 2023. doi: 10.1016/j.technovation.2021.102386
|
[12] |
S. Ghimire, J. Y. Choi, and B. Lee, “Using blockchain for improved video integrity verification,” IEEE Transactions on Multimedia, vol. 22, no. 1, pp. 108–121, 2020. doi: 10.1109/TMM.2019.2925961
|
[13] |
P. Gao, P. X. Chai, and J. Lang, “Behavior steganography in social networks based on 0–1 knapsack algorithm,” Acta Electonica Sinica, vol. 50, no. 3, pp. 753–758, 2022. (in Chinese) doi: 10.12263/DZXB.20210742
|
[14] |
A. Cheddad, J. Condell, K. Curran, et al., “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010. doi: 10.1016/j.sigpro.2009.08.010
|
[15] |
M. S. Rathore, M. Poongodi, P. Saurabh, et al., “A novel trust-based security and privacy model for internet of vehicles using encryption and steganography,” Computers and Electrical Engineering, vol. 102, article no. 108205, 2022. doi: 10.1016/j.compeleceng.2022.108205
|
[16] |
O. Torki, M. Ashouri-Talouki, and M. Mahdavi, “Blockchain for steganography: Advantages, new algorithms and open challenges,” in Proceedings of the 18th International ISC Conference on Information Security and Cryptology, Isfahan, Iran, Islamic Republic of, pp. 1–5, 2021.
|
[17] |
S. Y. Zheng, C. Q. Yin, and B. Wu, “Keys as secret messages: Provably secure and efficiency-balanced steganography on blockchain,” in Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, New York City, NY, USA, pp. 1269–1278, 2021.
|
[18] |
D. Silver, T. Hubert, J. Schrittwieser, et al., “Mastering chess and shogi by self-play with a general reinforcement learning algorithm,” arXiv preprint, arXiv: 1712.01815, 2017.
|
[19] |
F. Zhang and Y. Ding, “Research on the application of internet of things and block chain technology in improving supply chain financial risk management,” in Proceedings of the 2021 International Conference on Computer, Blockchain and Financial Development, Nanjing, China, pp. 347–350, 2021.
|
[20] |
V. Hassija, V. Chamola, V. Gupta, et al., “A survey on supply chain security: Application areas, security threats, and solution architectures,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6222–6246, 2021. doi: 10.1109/JIOT.2020.3025775
|
[21] |
Q. Q. Huang, R. Wen, Y. Han, et al., “Intelligent fault identification for industrial internet of things via prototype-guided partial domain adaptation with momentum weight,” IEEE Internet of Things Journal, vol. 10, no. 18, pp. 16381–16391, 2023. doi: 10.1109/JIOT.2023.3267830
|
[22] |
P. Zhang, C. Cui, D. Liu, et al., “Data security sharing and interaction method of regulation system based on blockchain,” in Proceedings of the IEEE 10th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, China, pp. 1071–1074, 2022.
|
[23] |
Z. Zhou, Y. L. Tian, J. B. Xiong, et al., “Blockchain-enabled secure and trusted federated data sharing in IIoT,” IEEE Transactions on Industrial Informatics, vol. 19, no. 5, pp. 6669–6681, 2023. doi: 10.1109/TII.2022.3215192
|
[24] |
J. N. Wei, Q. C. Zhu, Q. M. Li, et al., “A redactable blockchain framework for secure federated learning in industrial internet of things,” IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17901–17911, 2022. doi: 10.1109/JIOT.2022.3162499
|
[25] |
S. Qahtan, K. Y. Sharif, A. A. Zaidan, et al., “Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems,” IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6415–6423, 2022. doi: 10.1109/TII.2022.3143619
|
[26] |
V. Mothukuri, R. M. Parizi, S. Pouriyeh, et al., “FabricFL: Blockchain-in-the-loop federated learning for trusted decentralized systems,” IEEE Systems Journal, vol. 16, no. 3, pp. 3711–3722, 2022. doi: 10.1109/JSYST.2021.3124513
|
[27] |
P. Kumar, R. Kumar, G. P. Gupta, et al., “P2TIF: A blockchain and deep learning framework for privacy-preserved threat intelligence in industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6358–6367, 2022. doi: 10.1109/TII.2022.3142030
|
[28] |
R. Kumar, P. Kumar, R. Tripathi, et al., “A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 16492–16503, 2022. doi: 10.1109/TITS.2021.3098636
|
[29] |
Q. Dang, W. B. Shang, L. Yan, et al., “Power business data sharing system based on blockchain and cryptography technology,” in Proceedings of the 2021 International Conference on Networking, Communications and Information Technology, Manchester, UK, pp. 382–386, 2021.
|
[30] |
A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, et al., “PSO–blockchain-based image steganography: Towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture,” Multimedia Tools and Applications, vol. 80, no. 9, pp. 14137–14161, 2021. doi: 10.1007/s11042-020-10284-y
|
[31] |
M. T. Xu, H. Z. Wu, G. R. Feng, et al., “Broadcasting steganography in the blockchain,” in Proceedings of the 18th International Workshop on Digital Watermarking, Chengdu, China, pp. 256–267, 2020.
|
[32] |
P. Rede, S. Iyer, S. Sharma, et al., “Blockchain based identity management system using cryptography and steganography,” in Proceedings of the 2023 International Conference on Information Technology, Amman, Jordan, pp. 173–177, 2023.
|
[33] |
D. Silver, J. Schrittwieser, K. Simonyan, et al., “Mastering the game of go without human knowledge,” Nature, vol. 550, no. 7676, pp. 354–359, 2017. doi: 10.1038/nature24270
|
[34] |
Y. Cao, “Research on carrierless steganography methods for secure covert communication,” Ph. D. Thesis, Nanjing University of Information Science and Technology, Nanjing, China, 2022. (in Chinese)
|
[35] |
W. She, L. J. Huo, W. Liu, et al., “A blockchain-based covert communication model for hiding sensitive documents and sender identity,” Acta Electonica Sinica, vol. 50, no. 4, article no. 1002, 1013. doi: 10.12263/DZXB.20211021
|
[36] |
J. Partala, “Provably secure covert communication on blockchain,” Cryptography, vol. 2, no. 3, article no. 18, 2018. doi: 10.3390/cryptography2030018
|
[37] |
A. I. Basuki and D. Rosiyadi, “Joint transaction-image steganography for high capacity covert communication,” in Proceedings of the 2019 International Conference on Computer, Control, Informatics and its Applications, Tangerang, Indonesia, pp. 41–46, 2019.
|
[38] |
S. Liu, Y. X. Liu, C. Feng, et al., “Blockchain privacy data protection method based on HEVC video steganography,” in Proceedings of the 3rd International Conference on Smart BlockChain, Zhengzhou, China, pp. 1–6, 2020.
|
[39] |
W. She, L. J. Huo, Z. Tian, et al., “A double steganography model combining blockchain and interplanetary file system,” Peer-to-Peer Networking and Applications, vol. 14, no. 5, pp. 3029–3042, 2021. doi: 10.1007/s12083-021-01143-0
|
[40] |
D. Mitic, A. Lebl, B. Trenkić, et al., “An overview and analysis of BER for three diversity techniques in wireless communication systems,” Yugoslav Journal of Operations Research, vol. 25, no. 2, pp. 251–269, 2015. doi: 10.2298/YJOR131120007M
|
[41] |
D. Chicco, M. J. Warrens, and G. Jurman, “The coefficient of determination r-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation,” PeerJ Computer Science, vol. 7, article no. e623, 2021. doi: 10.7717/peerj-cs.623
|
[42] |
Y. J. Luo, J. H. Qin, X. Y. Xiang, et al., “Coverless image steganography based on multi-object recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 7, pp. 2779–2791, 2021. doi: 10.1109/TCSVT.2020.3033945
|
[43] |
V. Holub and J. Fridrich, “Digital image steganography using universal distortion,” in Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, pp. 59–68, 2013.
|
[44] |
V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Costa Adeje, Spain, pp. 234–239, 2012.
|
[45] |
T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in Proceedings of the 12th International Workshop on Information Hiding, Calgary, Canada, pp. 161–177, 2010.
|
[46] |
V. Sedighi, R. Cogranne, and J. Fridrich, “Content-adaptive steganography by minimizing statistical detectability,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 221–234, 2016. doi: 10.1109/TIFS.2015.2486744
|
[47] |
M. Boroumand, M. Chen, and J. Fridrich, “Deep residual network for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181–1193, 2019. doi: 10.1109/TIFS.2018.2871749
|
[48] |
R. Zhang, F. Zhu, J. Y. Liu, et al., “Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1138–1150, 2020. doi: 10.1109/TIFS.2019.2936913
|