Citation: | LIU Yuanni, FAN Fei, ZHAO Yuyang, ZHANG Jianhui, ZHOU Yousheng. A Convert Communication Scheme of Blockchain Based on Image Multilevel Steganography Embedding[J]. Journal of Electronics & Information Technology, 2025, 47(4): 1126-1139. doi: 10.11999/JEIT240798 |
[1] |
ZHENG Tongxing, WANG Huiming, NG D W K, et al. Multi-antenna covert communications in random wireless networks[J]. IEEE Transactions on Wireless Communications, 2019, 18(3): 1974–1987. doi: 10.1109/TWC.2019.2900915.
|
[2] |
HU Jinsong, LI Hongwei, CHEN Youjia, et al. Covert communication in cognitive radio networks with poisson distributed jammers[J]. IEEE Transactions on Wireless Communications, 2024, 23(10): 13095–13109. doi: 10.1109/TWC.2024.3398651.
|
[3] |
HU Jinsong, YE Longjie, CHEN Youjia, et al. Covert communications for text semantic with finite blocklength[J]. IEEE Wireless Communications Letters, 2024, 13(10): 2842–2846. doi: 10.1109/LWC.2024.3448614.
|
[4] |
RATHORE M S, POONGODI M, SAURABH P, et al. A novel trust-based security and privacy model for internet of vehicles using encryption and steganography[J]. Computers and Electrical Engineering, 2022, 102: 108–205. doi: 10.1016/j.compeleceng.2022.108205.
|
[5] |
YANG Qinglin, ZHAO Yetong, HUANG Huawei, et al. Fusing blockchain and AI with metaverse: A survey[J]. IEEE Open Journal of the Computer Society, 2022, 3: 122–136. doi: 10.1109/OJCS.2022.3188249.
|
[6] |
LIU Yuanni, PAN Ling, and CHEN Shanzhi. A hierarchical blockchain-enabled security-threat assessment architecture for IoV[J]. Digital Communications and Networks, 2024, 10(4): 1035–1047. doi: 10.1016/j.dcan.2022.12.019.
|
[7] |
WANG Lei, FAN Rongfei, HU Han, et al. Age of information minimization for opportunistic channel access[J]. IEEE Transactions on Communications, 2024, 72(12): 7449–7465. doi: 10.1109/TCOMM.2024.3415608.
|
[8] |
MA Yue, MA Ruiqian, LIN Zhi, et al. Improving age of information for covert communication with time-modulated arrays[J]. IEEE Internet of Things Journal, 2025, 12(2): 1718–1731. doi: 10.1109/JIOT.2024.3466855.
|
[9] |
KUMAR R, TRIPATHI R, MARCHANG N, et al. A secured distributed detection system based on IPFS and blockchain for industrial image and video data security[J]. Journal of Parallel and Distributed Computing, 2021, 152: 128–143. doi: 10.1016/j.jpdc.2021.02.022.
|
[10] |
ZHANG Ru, ZHU Feng, LIU Jianyi, et al. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1138–1150. doi: 10.1109/TIFS.2019.2936913.
|
[11] |
李敬轩, 胡润文, 阮观奇, 等. 基于手工特征提取与结果融合的CNN音频隐写分析算法[J]. 计算机学报, 2021, 44(10): 2061–2075. doi: 10.11897/SP.J.1016.2021.02061.
LI Jingxuan, HU Runwen, RUAN Guanqi, et al. A CNN based audio steganalysis algorithm by manual feature extraction and result merging[J]. Chinese Journal of Computers, 2021, 44(10): 2061–2075. doi: 10.11897/SP.J.1016.2021.02061.
|
[12] |
REINEL T S, RAUL R P, and GUSTAVO I. Deep learning applied to steganalysis of digital images: A systematic review[J]. IEEE Access, 2019, 7: 68970–68990. doi: 10.1109/ACCESS.2019.2918086.
|
[13] |
REINEL T S, BRAYAN A A H, ALEJANDRO B O M, et al. GBRAS-Net: A convolutional neural network architecture for spatial image steganalysis[J]. IEEE Access, 2021, 9: 14340–14350. doi: 10.1109/ACCESS.2021.3052494.
|
[14] |
李梦涵, 陈可江, 张卫明, 等. 基于合成语音的计算安全隐写方法[J]. 网络与信息安全学报, 2022, 8(3): 134–141. doi: 10.11959/j.issn.2096-109x.2022025.
LI Menghan, CHEN Kejiang, ZHANG Weiming, et al. Computationally secure steganography based on speech synthesis[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 134–141. doi: 10.11959/j.issn.2096-109x.2022025.
|
[15] |
李彦峰, 丁丽萍, 吴敬征, 等. 区块链环境下的新型网络隐蔽信道模型研究[J]. 通信学报, 2019, 40(5): 67–78. doi: 10.11959/j.issn.1000-436x.2019111.
LI Yanfeng, DING Liping, WU Jingzheng, et al. Research on a new network covert channel model in blockchain environment[J]. Journal on Communications, 2019, 40(5): 67–78. doi: 10.11959/j.issn.1000-436x.2019111.
|
[16] |
ZHANG Lejun, ZHANG Zhijie, WANG Weizheng, et al. Research on a covert communication model realized by using smart contracts in blockchain environment[J]. IEEE Systems Journal, 2022, 16(2): 2822–2833. doi: 10.1109/JSYST.2021.3057333.
|
[17] |
黄冬艳, 李琨. 多地址的时间型区块链隐蔽通信方法研究[J]. 通信学报, 2023, 44(2): 148–159. doi: 10.11959/j.issn.1000-436x.2023026.
HUANG Dongyan and LI Kun. Research on multi-address time-based blockchain covert communication method[J]. Journal on Communications, 2023, 44(2): 148–159. doi: 10.11959/j.issn.1000-436x.2023026.
|
[18] |
SHE W, HUO L J, TIAN Z, et al. A double steganography model combining blockchain and interplanetary file system[J]. Peer-to-Peer Networking and Applications, 2021, 14(5): 3029–3042. doi: 10.1007/s12083-021-01143-0.
|
[19] |
张祯, 倪嘉铭, 姚晔, 等. 基于同义词扩展和标签传递机制的文本无载体信息隐藏方法[J]. 通信学报, 2021, 42(9): 173–183. doi: 10.11959/j.issn.1000-436x.2021139.
ZHANG Zhen, NI Jiaming, YAO Ye, et al. Text coverless information hiding method based on synonyms expansion and label delivery mechanism[J]. Journal on Communications, 2021, 42(9): 173–183. doi: 10.11959/j.issn.1000-436x.2021139.
|
[20] |
DUAN Xintao, JIA Kai, LI Baoxia, et al. Reversible image steganography scheme based on a U-Net structure[J]. IEEE Access, 2019, 7: 9314–9323. doi: 10.1109/ACCESS.2019.2891247.
|
[21] |
LU Shaoping, WANG Rong, ZHONG Tao, et al. Large-capacity image steganography based on invertible neural networks[C]. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Nashville, USA, 2021: 10811–10820. doi: 10.1109/CVPR46437.2021.01067.
|
[22] |
GUO Mengxi, ZHAO Shijie, LI Yue, et al. Invertible single image rescaling via steganography[C]. 2021 IEEE International Conference on Multimedia and Expo (ICME), Taipei, China, 2022: 1–6. doi: 10.1109/ICME52920.2022.9859915.
|
[23] |
SONG Yalin, ZHONG Yuhao, GAN Zhihua, et al. Generative adversarial networks-based image steganography with multiscale features integration[J]. Journal of Electronic Imaging, 2022, 31(5): 053028. doi: 10.1117/1.JEI.31.5.053028.
|
[24] |
吴友情, 郭玉堂, 汤进, 等. 基于自适应哈夫曼编码的密文可逆信息隐藏算法[J]. 计算机学报, 2021, 44(4): 846–858. doi: 10.11897/SP.J.1016.2021.00846.
WU Youqing, GUO Yutang, TANG Jin, et al. Reversible data hiding in encrypted images using adaptive huffman encoding strategy[J]. Chinese Journal of Computers, 2021, 44(4): 846–858. doi: 10.11897/SP.J.1016.2021.00846.
|
[25] |
YI Shuang and ZHOU Yicong. Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019, 21(1): 51–64. doi: 10.1109/TMM.2018.2844679.
|
[26] |
CHEN Kaimeng and CHANG C C. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. Journal of Visual Communication and Image Representation, 2019, 58: 334–344. doi: 10.1016/j.jvcir.2018.12.023.
|
[27] |
WU Youqing, XIANG Youzhi, GUO Yutang, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929–1938. doi: 10.1109/TMM.2019.2952979.
|
[28] |
CHEN Jianguo, LI Kenli, and YU P S. Privacy-preserving deep learning model for decentralized VANETs using fully homomorphic encryption and blockchain[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(8): 11633–11642. doi: 10.1109/TITS.2021.3105682.
|
[29] |
WANG Shujuan, HU Yingnan, and QI Guanqiu. Blockchain and deep learning based trust management for Internet of Vehicles[J]. Simulation Modelling Practice and Theory, 2022, 120: 102627. doi: 10.1016/j.simpat.2022.102627.
|
[30] |
XU Yan, LIU Xinyan, CUI Jie, et al. L-TCM: A lightweight privacy-preserving traffic condition monitoring scheme with source authentication in cloud-assisted VANETs[J]. IEEE Systems Journal, 2023, 17(4): 6138–6147. doi: 10.1109/JSYST.2023.3279620.
|