Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Derivative Matrix-Based Covert Communication Method in Blockchain

    Xiang Zhang1, Xiaona Zhang2,4,*, Xiaorui Zhang3,5,6, Wei Sun6,7, Ruohan Meng8, Xingming Sun1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 225-239, 2023, DOI:10.32604/csse.2023.034915

    Abstract The data in the blockchain cannot be tampered with and the users are anonymous, which enables the blockchain to be a natural carrier for covert communication. However, the existing methods of covert communication in blockchain suffer from the predefined channel structure, the capacity of a single transaction is not high, and the fixed transaction behaviors will lower the concealment of the communication channel. Therefore, this paper proposes a derivation matrix-based covert communication method in blockchain. It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full… More >

  • Open Access

    ARTICLE

    Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks

    Zeke Wu1, Kefeng Guo2,*, Rui Liu1, Shibin Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 583-598, 2023, DOI:10.32604/cmes.2022.023093

    Abstract In recent years, Internet of Things (IoT) technology has emerged and gradually sprung up. As the needs of large-scale IoT applications cannot be satisfied by the fifth generation (5G) network, wireless communication network needs to be developed into the sixth generation (6G) network. However, with the increasingly prominent security problems of wireless communication networks such as 6G, covert communication has been recognized as one of the most promising solutions. Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent, which makes the transmission content and transmission behavior challenging to be detected by… More > Graphic Abstract

    Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks

  • Open Access

    ARTICLE

    A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen

    Lejun Zhang1, 2, Zhijie Zhang1, Weizheng Wang3, Rasheed Waqas1, Chunhui Zhao1, 4, Seokhoon Kim5, Huiling Chen6, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 597-616, 2020, DOI:10.32604/cmc.2020.011554

    Abstract As an extension of the traditional encryption technology, information hiding has been increasingly used in the fields of communication and network media, and the covert communication technology has gradually developed. The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance, which can effectively alleviate the disadvantages and problems of traditional covert communication. However, its combination with covert communication thus far has been mostly at the theoretical level. The BLOCCE method, as an early result of the combination of blockchain and covert communication technology, has the problems of low information embedding efficiency, the use… More >

Displaying 1-10 on page 1 of 3. Per Page