Loading web-font TeX/Math/Italic
Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing | CIE Journals & Magazine | IEEE Xplore

Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing


Abstract:

The rapid development of Internet of things (IoT) and edge computing technologies has brought forth numerous possibilities for the intelligent and digital future. The fre...Show More

Abstract:

The rapid development of Internet of things (IoT) and edge computing technologies has brought forth numerous possibilities for the intelligent and digital future. The frequent communication and interaction between devices inevitably generate a large amount of sensitive information. Deploying a blockchain network to store sensitive data is crucial for ensuring privacy and security. The openness and synchronicity of blockchain networks give rise to challenges such as transaction privacy and storage capacity issues, significantly impeding their development in the context of edge computing and IoT. This paper proposes a reliable fog computing service solution based on a blockchain fog architecture. This paper stores data files in the inter planetary file system (IPFS) and encrypts the file hash values used for retrieving data files with stream cipher encryption. It employs a steganographic transmission technique leveraging AlphaZero's Gomoku algorithm to discretely transmit the stream cipher key across the blockchain network without a carrier, thus achieving dual encryption. This approach aims to mitigate the storage burden on the blockchain network while ensuring the security of transaction data. Experimental results demonstrate that the model enhances the transmission capacity of confidential information from kilobytes (KB) to megabytes (MB) and exhibits high levels of covert and security features.
Published in: Chinese Journal of Electronics ( Volume: 33, Issue: 4, July 2024)
Page(s): 886 - 898
Date of Publication: 22 July 2024

ISSN Information:


SECTION I.

Introduction

The number of Internet of things (IoT) networked devices is expected to grow exponentially with the advent of the 5G era [1]. Addressing the challenges of the quality of communication (QOC) and security in IoT communication using edge computing technology poses new challenges for researchers. Numerous studies have indicated that the integration of edge computing into the IoT creates a vast network encompassing multiple domains. Therefore, in such an extensive communication network, researching the security of communication and data holds significant importance [2], [3]. Many scholars have recognized the limitations of single-domain attack defenses, prompting the exploration of cross-domain solutions. Leveraging blockchain technology, which provides tamper-resistant data records without centralized authorization and ensures data integrity and authenticity [4], has become a widely adopted approach in cross-domain solutions [5].

As illustrated in Figure 1, the architecture of the Internet of things and blockchain network is built upon a specific data structure - chained blocks [6]. Each block contains a certain number of transaction records and is linked to the preceding block, forming an encrypted and verified chain structure that ensures data integrity. In this system, each smart device functions as a self-maintaining and self-regulating independent network node. These nodes can exchange information or verify identities with the assistance of smart contracts. This not only provides a high level of security and resilience [7], but also has lower computing and storage costs compared to centralized network architectures.

Figure 1. - Architecture of the internet of things and blockchain network
Figure 1.

Architecture of the internet of things and blockchain network

Despite various advantages demonstrated by block-chain technology, it still faces numerous challenges in practical applications [8]. Particularly in terms of data security, with the explosive growth of data, a significant amount of private information is transmitted within data streams. Publicly visible blockchain networks lack the ability for covert transmission and storage of this type of information [9]. In such scenarios, steganography provides a potential solution for blockchain in this predicament. The basic principle of steganography is to embed information into another carrier without attracting the attention of the outside world, so as to realize the covert transmission of information. For example, embedding secret information in digital images [10], audio [11], video [12], and other multimedia files makes it difficult for ordinary observers to detect. Its high level of covert makes it applicable in military, communication, and security fields [13]. Unlike traditional encryption techniques, steganography not only encrypts information but also completely conceals the existence of the information. However, it has its limitations [14]. Although this technology offers good covert in certain information communication scenarios, it still has some inherent flaws. For instance, once steganography is detected, the carrier it-self may be regarded as a suspicious object. Furthermore, with the increase in computing capabilities, numerous steganography detection methods are gradually emerging, making the security of traditional steganography methods challenging [15].

In current research, some scholars have focused on empowering blockchain with steganography techniques to further enhance the security and privacy of the block-chain. Through the integration of steganography techniques, the blockchain achieves not only data encryption but also data covert [16]. Similarly, the application of steganography techniques in blockchain provides a public, immutable, and distributed platform. Simultaneously, it enhances the anonymity of steganography techniques, making the carriers of steganographic information more secure and resilient [17]. However, the traditional embedded steganography schemes currently used in research inevitably alter the statistical characteristics of the carriers, causing distortion in the carrier content. This distortion provides crucial detection evidence for steganalysis, making it challenging to resist steganalysis.

Therefore, this paper proposes and verifies a new steganography method without carrier information through a large number of experiments, which integrates steganography, stream cipher technology and various encryption strategies [18]. We utilize blockchain as a platform for information transmission and storage. This comprehensive, multi-layered security framework not only provides security through multiple encryption strategies but also significantly enhances the reliability and traceability of data through the distributed ledger and smart contract mechanisms of blockchain. In the experimental validation section, we demonstrate the high advantages of this integrated method in terms of covert, security, and reliability. In summary, the main contributions of this research include:

  1. We proposed a ternary carrier-less steganography method based on the moves of Gomoku (Five in a Row).

  2. We constructed a blockchain dual encryption system that integrates carrier-less steganography techniques to achieve highly secure information transmission and enhance system robustness.

  3. We utilized an AlphaZero-based Gomoku game model [18] as the key generation model for stream cipher, addressing the challenge of sharing stream cipher keys with redundancy while ensuring randomness.

The subsequent sections of this paper are organized as follows: Section II reviews relevant prior work and provides a theoretical background, laying the foundation for the subsequent methodology and experimental design. Section III introduces the structure of the proposed framework. Section IV details the experimental design. Finally, Section V discusses the experimental results and their significance. We firmly believe that this study will provide new perspectives and directions for security research in the field of information communication.

SECTION II.

Related Work

Since the widespread applications of blockchain technology in various fields such as supply chain, healthcare, finance, and the Internet of things [19]–​[21], research on blockchain technology has entered a period of rapid development. Currently, numerous researchers are actively investigating the scalability, security, privacy protection, and integration with other technologies [22] (such as artificial intelligence, secure multi-party computation, federated learning) of blockchain. Especially, strengthening the data security of blockchain network has become the focus of current research [23].

Some researchers have focused on introducing new technologies to ensure data integrity and tamper resistance. For example, Wei et al. [24] proposed a modifiable blockchain framework for secure federated learning in industrial IoT, presenting a “security-enhanced solution”. Similar studies include Qahtan et al.'s work [25], who introduced a multidimensional security and privacy benchmarking framework for blockchain-based IoT healthcare systems in Industry 4.0. Mothukuri et al. [26] integrated federated learning with blockchain technology to address the challenges in data security sharing encountered by existing federated learning methods. How-ever, the current research on these types of methods still leans towards the academic realm. The “security-enhanced solution” proposed by Wei et al. exhibits certain vulnerabilities to model update attacks by malicious agents, and its robustness in secure transmission is not entirely flawless. Although the “multi-dimensional evaluation scheme” proposed by Qahtan et al. shows remarkable practical results, it is difficult to apply in practice because of its complex structural design.

Similarly, some researchers focus on integrating new cryptographic techniques with deep learning to ensure data privacy and security. For instance, Kumar et al. [27] proposed a blockchain and deep learning-based frame-work for privacy protection and threat identification in networks. Kumar et al. [28] presented a privacy-preserving security framework using blockchain-based deep learning to provide privacy and security in cooperative intelligent transportation systems. Dang et al. in [29] designed a blockchain and cryptography-based power business data sharing system to address issues such as the lack of dynamics in data transmission encryption, long data file download times, and poor security in the presence of multiple user nodes. However, the current research in this category still remains largely theoretical, with the primary limitation being computational resources. For example, in the “comprehensive security solution” proposed by Kumar et al., the deep learning module requires substantial computational resources, making it challenging to fully configure the resources during actual network transmission and synchronization processes. Similarly, Kumar et al. achieve intelligent transmission and uploading through the construction of a “multilayer security solution”, but its complexity affects real-time performance and cannot be practically applied due to computational resource limitations.

A significant amount of research has made valuable contributions to enhancing the data security of block-chain networks. However, current studies exhibit certain limitations, including reliance on specific encryption algorithms, lack of defense against various types of attacks, and issues related to the flexibility and scalability of data in different application scenarios. These limitations not only limit the wide application of blockchain technology, but also provide researchers with a new exploration direction. Therefore, recent research has increasingly focused on the integration of steganography techniques to enhance the data covert and operability of blockchain networks from various perspectives, addressing the protection of data as a noteworthy and exploratory problem.

Some studies have explored the integration of steg-anography techniques to enhance the covert and operability of blockchain data. For example, Mohsin et al. in [30] proposed a novel method based on blockchain and steganography for securely updating and sharing the COVID-19 data between hospitals. This method effectively improves the security of medical data transmission. Xu et al. [31] introduced a new steganography method that broadcasts secret data in the blockchain to enhance data security. This “data broadcast security enhancement method” increases the security of data transmission to some extent. Rede et al. [32] used steganography combined with blockchain technology to address security vulnerabilities that may arise when sharing hash values of identity documents, significantly enhancing the security of personal identity authentication. However, the existing research in this field still faces challenges, mainly reflected in low efficiency or limited applicability to different data types. For instance, the method proposed by Mohsin et al. is primarily limited to the healthcare data domain, lacking universal applicability to other fields. Xu et al. did not consider optimization for the blockchain network situation and steganographic carrier capacity, raising doubts about its practical application effects and environments. Rede et al. 's work is constrained by the efficiency limitations of the method, making it challenging for practical applications. Although the work conducted by the aforementioned researchers in the research area of “integrating steganography techniques to enhance blockchain data security” still presents certain challenges, existing research demonstrates that this direction is an effective approach to improving the security of blockchain data and exploring new avenues for steganography techniques. Stegano-graphy can effectively prevent data tampering or theft, while blockchain can provide a fair and anonymous platform under smart contracts for steganography techniques. Hence, this paper focuses on using Gomoku move actions as a generative behavioral steganography method, enhancing the capacity of steganographic carriers using a ternary approach, overcoming the transmission limitations of small batches of data in steganography techniques. The blockchain is optimized by using stream cipher to achieve security, thus realizing anonymity of steganography carrier and flexibility of data transmission. This not only addresses the capacity limitations of traditional steganography techniques but also enhances the security of data transmission and the non-traceability of steganographic carriers under a multi-layered encryption strategy.

SECTION III.

Methodology

This paper introduces a generative steganographic method for Gomoku integrated with AlphaZero in ternary representation (AGSM) and stream cipher technology into the blockchain network, and proposes a highly robust blockchain covert communication model (BCCM). The framework of BCCM is as depicted in Figure 2, consists of an integrated stream cipher embedding module and an integrated stream cipher extraction module, both combined with AlphaZero-based ternary Gomoku behavioral generative steganograohy.

  • In the stream cipher embedding module integrated with AGSM:

    • Step 1:

      Alice uploads a file through the IPFS system. The file's hash is encrypted using a key with stream cipher encryption.

    • Step 2:

      The key is embedded in the Gomoku board through generative steganography.

    • Step 3:

      Alice sends the encrypted file hash to Bob and stores the Gomoku board in the blockchain network.

  • In the stream cipher extraction module integrated with AGSM:

    • Step 1:

      Bob acquires the encrypted file hash through a ciphertext-sharing channel.

      Figure 2 - Overview of the methodology.
      Figure 2

      Overview of the methodology.

    • Step 2:

      Bob retrieves the Gomoku board from the blockchain network, extracts the key using generative steganography, and utilizes the key to obtain the file hash value.

    • Step 3:

      Bob downloads the file from the IPFS system using the obtained file hash value.

By combining the tamper-resistant nature of block-chain with the imperceptibility of Gomoku behavioral steganography, BCCM is optimized in terms of covert and security.

1. AGSM and Stream Cipher

The Gomoku move model based on AlphaZero is similar to AlphaGoZero [33]. It primarily consists of a Monte Carlo tree search (MCTS) and a reinforcement learning network, requiring no expert dataset. However, AlphaZero has a faster training speed compared with AlphaGoZero. Specifically, the reinforcement learning network is a neural network denoted as f_{\theta} with parameters \theta. This network takes the game state and model parameters as input and outputs probabilities and values. The relationship is as follows:\begin{align*} & (p,\ v)=f_{\theta}(s) \tag{1}\\ & p_{a}=\mathrm{P}\mathrm{r}(a\vert s) \tag{2} \end{align*}

View SourceRight-click on figure for MathML and additional features. the move probability vector p represents the probability of choosing each move action a, while the value v is the predicted evaluation value of the current player winning the game in the game state s. MCTS can be viewed as a self-play algorithm that, given neural network parameters \theta and game state s, calculates the move vector recommended by the search probability. The formula is as follows:\begin{gather*} \pi=\alpha_{\theta}(s) \tag{3}\\ \alpha_{a}\propto N(s,\ a)^{\frac{1}{T}} \tag{4} \end{gather*}
View SourceRight-click on figure for MathML and additional features.
where T is the temperature parameter. The reinforcement network uses MCTS to calculate each move action. Initially, the neural network is initialized with random weights \theta. In each subsequent iteration i\geq 1, self-play is performed. For the t-th time step, the neural network f_{\theta} utilizes the network from the previous iteration f_{\theta-1} to execute MCTS search. Moves are then sampled using the probability distribution \pi_{t}. The game terminates at step y when both players pass, the search value is below a threshold, or the game exceeds the maximum length. The match is then scored, and a reward r_{y}\in\{-1,1\} is assigned.

The data for each time step t is stored as (S_{t}, \pi t, Zt), where Z_{t}=\pm r_{y}. The new network parameters \theta^{\prime} are trained using data (s,\ \pi,\ z) uniformly sampled from all time steps in the previous iteration. The neural network is updated to minimize the error between the predicted value v and the winner z in self-play, maximizing the similarity between the neural network move probabilities p and search probabilities \pi. Specifically, the loss function l, which is the sum of mean squared error and cross-entropy losses, is used. Gradient descent is employed to adjust the parameters \theta. The formula can be expressed as follows:\begin{equation*} l=(z-v)^{2}-\pi^{y}\log p+c\Vert \theta\Vert ^{2} \tag{5} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

After AlphaZero completes the moves on the initial chessboard, the final chessboard will be output, and this chess record is encoded by a ternary encoder. Specifically, for a Gomoku board with dimensions of 15 ×15, the top-left corner is marked with coordinates (1,1), and the bottom-right corner is marked with coordinates (15,15). For each grid x, if a white piece is placed, it is marked as 1; if no piece is placed, it is marked as 0; and if a black piece is placed, it is marked as 2. This results in the chessboard matrix \pmb{M}, represented as follows:\begin{equation*} \boldsymbol{M}=\begin{bmatrix} x_{1,1} & \cdots & x_{1,15} \\ \vdots & \ddots & \vdots \\ x_{15,1} & \cdots & x_{15,15} \end{bmatrix}, x_{i, j} \in\{0,1,2\} \tag{6} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

Transforming this matrix into a one-dimensional vector yields the ternary-encoded data m as below:\begin{equation*} m=x_{1,1}\ldots x_{1,15}\ldots x_{15,1}\ldots x_{15,15} \tag{7} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

Convert the ternary encoded data to binary data, which can be used as the key S input for a stream cipher encryptor. Encrypt the binary hash H of the file using the stream cipher, resulting in ciphertext Q: \begin{equation*} Q=S\oplus H \tag{8} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

Since the stream cipher is a symmetric and reversible encryption method, inputting the key S into the stream cipher encryptor and decrypting the ciphertext Q yields the encrypted binary hash H^{\prime} of the file:\begin{equation*} H=S\oplus Q \tag{9} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

As Gomoku is a game played on a 15 \times 15 board. In Gomoku, each position can be empty (without a piece), occupied by a white piece, or occupied by a black piece. Therefore, for each position, there can be three states: empty, white, or black. If we consider each position on the chessboard as a point, then the combination of the states of these points constitutes the position combination of a five piece chessboard. For each position, there can be three states, so the total number of possible position combinations is 3^{15\times 15}. This number is far greater than the number of atoms in the universe, so there are many combinations of positions on the Go board that are almost inexhaustible. In theory, AlphaZero's falling habits have extremely high randomness. In summary, the theo-retical collision probability of m is \frac{1}{3^{225}}, indicating that the key S possesses sufficient randomness. Assuming the encryption of a 128-bit plaintext using the above stream cipher, the brute-force attack space complexity is 2{128}, which is considered relatively secure given the current computational capability.

2. Fusion of AGSM Stream Cipher Embedding Module

At this stage, Alice and the recipient Bob establish an IPFS cluster and upload the file using IPFS to ob-tain the file hash. As shown in Figure 3, Alice uses the initial chessboard as the seed for generative steganogra-phy and the final chessboard as the key. The hash value is encrypted into ciphertext using a stream cipher. In addition, this article can only upload the state matrix of the opening game of Gomoku to the blockchain network, rather than uploading images to the blockchain network. This methodology guarantees a balance between covert operation and security, mitigating the risk of uploading sensitive privacy data in plaintext to the blockchain.

The specific steps of this embedding process are as follows:

  1. Alice uploads the file to IPFS and obtains the file hash returned by IPFS.

  2. Alice selects an opening move in a Gomoku game.

  3. Alice inputs the Gomoku opening move into the AlphaZero model to obtain the final state of the Gomoku game. The moves in this chess record are encoded as ternary data.

  4. Alice converts the ternary chessboard data to bi-nary data and inputs it, along with the file hash value, as the key and plaintext into the stream cipher model to obtain the ciphertext.

  5. Alice uploads the opening chess record to the blockchain network and sends the blockchain address where the record is located along with the ciphertext to Bob.

Algorithm 1: Information embedding process

Require:

Input: DataFile F, Gomoku opening move B.

Output: Ciphertext M, Gomoku endgame E.

1:

if (File is of the correct file type) then

2:

if (File passes required checks) then

3:

fileHash \leftarrow UploadFileToIPFS (F);

4:

else

5:

File is not compliant;

6:

end if

7:

else

8:

File is not of the correct file type;

9:

end if

10:

if (fileHash not exists) then

11:

Return;

12:

end if

13:

B\leftarrow[15][15];

14:

for (i=1 to 15) do

15:

// Choose a game opening for the gobang

16:

for (j=1 to 15) do

17:

Pieces \leftarrow GenerateChessPieces (); //Randomly choose to generate black pieces, white pieces, or no pieces

18:

while (Not comply with the rule) do

19:

Pieces \leftarrow GenerateChessPieces ();

20:

end while

21:

B[i][j]\leftarrow Pieces;

22:

end for

23:

end for

24:

E\leftarrow AlphaZeroModel (B);

25:

ternaryData \leftarrow EncodeTToTernary (E);

26:

binaryData \leftarrow ConvertTernaryToBinary(ternaryData);

27:

M ← StreamCipherModel(fileHash, binary Data);

28:

uploadToBlockchain (B);// Upload the game opening to the blockchain

29:

sendToBob (M).

Figure 3 - Embedding process diagram.
Figure 3

Embedding process diagram.

3. Fusion of AGSM Stream Cipher Extraction Module

Upon receiving the ciphertext from Alice, Bob downloads the Gomoku opening chessboard from the agreed-upon blockchain network. As shown in Figure 4, Bob uses the opening chessboard as the seed for generative steganography, the endgame chessboard as the key, and decrypts the ciphertext into the file hash using a stream cipher. Bob then uses the hash value to down-load the file from IPFS.

Figure 4 - Extraction process diagram.
Figure 4

Extraction process diagram.

The specific steps of this embedding process are as follows:

  1. Bob receives the ciphertext sent by Alice.

  2. Bob downloads the Gomoku opening from the blockchain network.

  3. Bob inputs the Gomoku opening into the Alp-haZero model to obtain the final state of the Gomoku game. The moves of this chess game are encoded as ternary data.

  4. Finally, Bob converts the ternary data to binary data and inputs it along with the ciphertext into the stream cipher model to obtain the file hash value.

  5. Bob inputs the file hash value into IPFS to retrieve the file.

Algorithm 2 Information extraction process

Require:

Input: Ciphertext M, Gomoku opening B.

Output: DataFile F, Gomoku endgame E.

1:

while (Connection is open) do

2:

if (Message is received) then

3:

messageDelivered \leftarrow true;

4:

else if(Timeout occurs) then

5:

handle timeout as needed;

6:

else if (Connection is closed) then

7:

handle closed connection;

8:

end if

9:

if (messageDelivered) then

10:

if (Message status is confirmed) then

11:

B\leftarrow DownloadChessBoardFromBlockchain();

12:

E ← AlphaZeroModel(B); // Apply AlphaZero model to get the game result

13:

ternaryData \leftarrow EncodeToTernary (E);

14:

binaryData ←ConvertTernaryToBinary(ternary Data);

15:

fileHash \leftarrow StreamCipherModel (M, binary Data);

16:

F ← FetchFileFromIPFS(fileHash); // Retrieve the file from IPFS using the hash value

17:

else

18:

messageDelivered← false;

19:

end if

20:

end if

21:

end while

SECTION IV.

Experiment

This section conducted experiments and analysis on the covert capacity, robustness, and covert of the proposed method, comparing it with existing methods. Inspired by Cao [34] and SHE [35], this study follows a similar experimental approach, and some results are referenced. AlphaZero is employed for Gomoku game move prediction, using the Paddle-2.0.2 deep learning framework and an RTX 3060 12GB GPU for 1100 training rounds. During training, after each game, the sample data is stored in the experience replay pool, and samples are collected from it for training the reinforcement learning network. The reinforcement learning network comprises a value network and a policy network. As the policy and value functions improve, the training samples are continually enhanced, gradually improving the capabilities of the trained agent. Mean squared error loss and crossentropy loss are used to optimize the value network and policy network, respectively. The formulas can be expressed as follows:\begin{gather*} l_{v}=(z-v)^{2} \tag{10}\\ l_{p}(\pi_{t},p_{t})=-\pi_{t}^{T}\log p_{t} \tag{11} \end{gather*}

View SourceRight-click on figure for MathML and additional features.

Figure 5 - Extraction process diagram.
Figure 5

Extraction process diagram.

From Figure 5, it can be observed that the crossentropy and mean squared error of the model gradually decrease. This indicates that the model's accuracy in predicting neural network outputs is gradually improving, and the difference between the output policy of the neural network and the policy output by MCTS is decreasing.

1. The Capacity of Covert

This paper conducted simulation experiments on sensitive documents of different sizes, encrypting these sensitive documents and uploading them to IPFS. The resulting hash values from IPFS were successfully embed-ded into Gomoku game boards for covert transmission. The comparison of the transmitted secret information quantities among different methods in the blockchain covert communication model is shown in Table 1.

Table 1 Transmission of secret information scale
Table 1- Transmission of secret information scale

From Table 1, it can be observed that compared to traditional methods, the proposed method in this study achieves a significant improvement in the order of magnitude of transmitted secret information, reaching MB. This is mainly because the study integrates blockchain and IPFS to achieve collaborative storage on-chain and off-chain. IPFS is used for off-chain storage of sensitive files, while the blockchain stores Gomoku game boards with embedded IPFS hash values. This collaborative approach effectively addresses the storage capacity issue of the blockchain, ensuring the integrity, authenticity, and security of the Gomoku game openings.

2. Robustness

This paper first simulates the potential attacks, such as noise, filtering, etc., that encrypted Gomoku game records may encounter during the communication process, as described in Table 2. Subsequently, the robustness of the proposed method is evaluated using the bit error rate (BER) as a robustness assessment metric. The BER formula is as follows [40]:\begin{equation*} \text{BER}=\frac{\sum_{i=1}^m p_i \oplus q_i}{m} \tag{12} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

Table 2 Simulated noise attacks
Table 2- Simulated noise attacks

As shown in Figure 6 and Table 2, the test results indicate that the proposed method exhibits high robustness against common attacks in communication channels. This is primarily attributed to the substantial color contrast between black and white pieces in Gomoku, allowing the game records to remain distinguishable even when subjected to attacks. Moreover, Gomoku gameplay does not rely on the specific order of moves in the record; it only requires the current state of the game board for deduction. Consequently, the recipient retains the ability to accurately deduce the final state of the Gomoku game, even when confronted with partially compromised game records.

3. Covert

Covert refers primarily to the imperceptibility of the steganographic process, with mean-square error (MSE) and structural similarity index (SSIM) serving as the primary metrics for evaluation. MSE primarily reflects the degree of difference between the cover image and the stego image. This metric is employed to assess the quality of the stego image obtained after embedding secret information. MSE is calculated by summing the squared differences of all pixel values between the cover image and the stego image, divided by the total number of pixels. A smaller MSE value indicates a better steganographic method. The formula for MSE is expressed as follows [42]:\begin{equation*} \text{MSE}=\sum_{i=1}^M \sum_{j=1}^N \frac{\left(I(i, j)-I^{\prime}(i, j)\right)^2}{M^\ast N} \tag{13} \end{equation*}

View SourceRight-click on figure for MathML and additional features. where i and j respectively denote the rows and columns of the image. I(i,j) represents the pixel at the i-th row and j-th column in the cover image, while I^{\prime}(i,j) represents the pixel at the i-th row and j-th column in the stego image.

Figure 6 - Illustration of noise attacks.
Figure 6

Illustration of noise attacks.

Structural similarity index (SSIM) is a measure of similarity between two images. A higher SSIM value indicates a greater similarity between the cover image and the stego image. The formula for SSIM is expressed as follows [42]:\begin{equation*} \text{SSIM}(x, y)=\frac{\left(2 \mu_x \mu_y+C_1\right)\left(\sigma_{x y}+C_2\right)}{\left(\mu_x^2+\mu_y^2+C_1\right)\left(\sigma_x^2+\sigma_y^2+C_2\right)} \tag{14} \end{equation*}

View SourceRight-click on figure for MathML and additional features. where \mu_{x} represents the mean of x, \mu_{v} represents the mean of y, \sigma_{x}^{2} represents the variance of x, \sigma_{y}^{2} represents the variance of y, \sigma_{xy} represents the covariance between x and y, and C_{1} and C_{2}i are constants used to maintain stability.

From the experimental results in Table 3, it can be observed that, compared to classic steganographic methods such as SUNI [43], WOW [44], HUGO [45], MiPOD [46], etc., the proposed method in this paper, due to the absence of a steganographic carrier, does not modify the chessboard containing the secret, and the monitoring party in the communication process cannot detect any traces of chessboard modification. Consequently, the model achieves a higher level of covert.

Table 3 Results of mse and ssim
Table 3- Results of mse and ssim

Steganalysis tools can detect steganographic activities, thereby compromising the covert of communication models. In this study, conventional steganalysis algorithms, SRNet [47] and Zhu-Net [48], were employed to analyze the aforementioned embedded steganographic methods and the proposed method in this paper, yielding detection accuracy results (Acc). Acc represents the detection accuracy of the steganalysis method, and a value closer to 50% indicates stronger resistance to steganalysis. The formula for Acc is as follows [42]:\begin{equation*} \text{Acc}=\frac{T_p+T_n}{T_p+F_n+F_p+T_n} \tag{15} \end{equation*}

View SourceRight-click on figure for MathML and additional features. where T_{p} represents the number of samples correctly predicted as containing hidden information by the steganalysis method, F_{p} represents the number of samples incorrectly predicted as not containing hidden information, T_{n} represents the number of samples correctly predicted as not containing hidden information, and F_{n} represents the number of samples incorrectly predicted as containing hidden information. The steganalysis results are shown in Figure 7. It is apparent that the aforementioned embedded steganographic techniques, which entail modifying the carrier to incorporate clandestine in- formation, unavoidably induce alterations in the statistical attributes of the carrier. As a result, they are difficult to resist detection by various steganalysis tools. In contrast, the method proposed in this paper integrates steganographic behavior seamlessly with regular Gomoku game behavior, without modifying the chessboard or causing distortion in the game records. This approach effectively withstands steganalysis.

Figure 7 - Steganalysis resistance chart.
Figure 7

Steganalysis resistance chart.

As this paper utilizes Gomoku as the steganograph-ic behavior, the rationality of the Gomoku records becomes particularly important. Since placing a stone in the center of the board is more advantageous than at the edges, conventional Gomoku strategies often involve the first move placed at the center, followed by spreading moves around it. Therefore, the stone placement pattern in the game records is more in line with a normal distribution. This paper establishes a Cartesian coordinate system with the center of the board as the origin. The distance between intersections located in the same row or column on the board is set to 1. In a 15 × 15 board, the coordinate ranges for the x-axis and y-axis are both [-7, +7]. The x and y coordinates follow independent normal distributions N(\mu,\ \sigma), and their probability density function is given by\begin{equation*} f(x)=\frac{1}{\sqrt{2 \pi} \sigma} \exp \left(-\frac{(x-\mu)^2}{2 \sigma^2}\right) \tag{16} \end{equation*}

View SourceRight-click on figure for MathML and additional features.

So, when \mu=0, the larger the \sigma is, the more dispersed the stone placements, and the smaller the \sigma is, the more concentrated the stone placements in the center of the board. In this paper, when generating the opening moves for Gomoku records, the first move is specified to be at the center of the board. Subsequent moves follow a random placement strategy that conforms to a normal distribution. The normal distribution model is set with \mu=0 and \sigma=7, resulting in \sigma=7.

Following the above-mentioned method, this paper generated 10000 pairs of coordinates, and their distribution pattern is illustrated in Figure 8. It is evident that coordinates have a probability of over 99% of falling within the chessboard, adhering to the standard Gomoku stone placement pattern. During the Gomoku record generation process, if the stone coordinates fall outside the board's boundaries or overlap with previously placed stones, new coordinates are obtained.

SECTION V.

Conclusion and Future Prospects

This paper proposes a highly robust blockchain covert communication model (BCCM), to achieve covert transmission of sensitive files within a blockchain. The model employs stream cipher technology to encrypt file hash values for security assurance. Additionally, it utilizes a generative steganographic method that integrates AlphaZero's ternary Gomoku behavior to embed the key within a Gomoku game, enhancing the covert of the transmission. The performance of the model is evaluated by comparing metrics such as MSE and SSIM with traditional methods. Experimental results indicate a significant improvement in the transmission of secret information, coupled with high levels of covert and security. However, the model has certain limitations, requiring a reanalysis of the game records during the extraction of secret information. In the future, we will extend the proposed steganography method to consider more practical application scenarios. The research will explore carrier-free covert communication methods based on behavioral protocols. Within the framework of adhering to estab- lished game rules, communication parties seek to promptly deduce actions that directly convey confidential information, relying on pre-established protocols, thereby obviating the necessity for computer-assisted calculations. In the future, we will extend the proposed steganography method to consider more practical application scenarios. In addition, this article will also use BCCM to optimize asymmetric encryption methods, embed public keys into chessboards, and use steganography for hiding. To facilitate the implementation of public key authentication and encryption in special military scenarios, achieving the effect of resisting man in the middle hijacking attacks without the need for third-party notarization.

Figure 8 - Stone placement pattern chart for coordinates.
Figure 8

Stone placement pattern chart for coordinates.

References

References is not available for this document.