{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:35:06Z","timestamp":1742967306850,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030616373"},{"type":"electronic","value":"9783030616380"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_3","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"41-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Bitcoin Blockchain Steganographic Analysis"],"prefix":"10.1007","author":[{"given":"Alexandre Augusto","family":"Giron","sequence":"first","affiliation":[]},{"given":"Jean Everson","family":"Martina","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Cust\u00f3dio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"unstructured":"Alsalami, N., Zhang, B.: Uncontrolled randomness in blockchains: Covert bulletin board for illicit activity. Cryptology ePrint Archive (2018). ia.cr\/2018\/1184","key":"3_CR1"},{"doi-asserted-by":"crossref","unstructured":"Alsalami, N., Zhang, B.: Utilizing public blockchains for censorship-circumvention and iot communication. In: 2019 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20137. IEEE (2019)","key":"3_CR2","DOI":"10.1109\/DSC47296.2019.8937637"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.rser.2018.10.014","volume":"100","author":"M Andoni","year":"2019","unstructured":"Andoni, M., et al.: Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 100, 143\u2013174 (2019)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-08509-8_3","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Andriesse","year":"2014","unstructured":"Andriesse, D., Bos, H.: Instruction-level steganography for covert trigger-based malware. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 41\u201350. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08509-8_3"},{"key":"3_CR5","volume-title":"Mastering Bitcoin: Programming the Open Blockchain","author":"AM Antonopoulos","year":"2017","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain. O\u2019Reilly Media Inc., Newton (2017)"},{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D., Andrade, E.: Redactable blockchain-or-rewriting history in bitcoin and friends. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 111\u2013126. IEEE (2017)","key":"3_CR6","DOI":"10.1109\/EuroSP.2017.37"},{"doi-asserted-by":"crossref","unstructured":"B\u0105k, P., Bieniasz, J., Krzemi\u0144ski, M., Szczypiorski, K.: Application of perfectly undetectable network steganography method for malware hidden communication. In: 2018 4th International Conference on Frontiers of Signal Processing (ICFSP), pp. 34\u201338. IEEE (2018)","key":"3_CR7","DOI":"10.1109\/ICFSP.2018.8552057"},{"doi-asserted-by":"crossref","unstructured":"Bassham, L.E., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, National Institute of Standards and Technology (NIST) (2010)","key":"3_CR8","DOI":"10.6028\/NIST.SP.800-22r1a"},{"doi-asserted-by":"crossref","unstructured":"Berndt, S., Li\u015bkiewicz, M.: Provable secure universal steganography of optimal rate: Provably secure steganography does not necessarily imply one-way functions. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 81\u201392. ACM (2016)","key":"3_CR9","DOI":"10.1145\/2909827.2930796"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306\u2013318. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49380-8_21"},{"key":"3_CR11","volume-title":"Hiding in Plain Sight","author":"E Cole","year":"2002","unstructured":"Cole, E.: Hiding in Plain Sight. Wiley, Hoboken (2002)"},{"issue":"6\u201310","key":"3_CR12","first-page":"71","volume":"2","author":"M Crosby","year":"2016","unstructured":"Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: Beyond bitcoin. Appl. Innov. 2(6\u201310), 71 (2016)","journal-title":"Appl. Innov."},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H Dobbertin","year":"1996","unstructured":"Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160: a strengthened version of RIPEMD. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 71\u201382. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-60865-6_44"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"6","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P.: A review on the use of blockchain for the internet of things. IEEE Access 6, 32979\u201333001 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Fionov, A.: Exploring covert channels in bitcoin transactions. In: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), pp. 0059\u20130064. IEEE (2019)","key":"3_CR15","DOI":"10.1109\/SIBIRCON48586.2019.8957861"},{"doi-asserted-by":"publisher","unstructured":"Von zur Gathen, J.: Cryptoschool. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48425-8","key":"3_CR16","DOI":"10.1007\/978-3-662-48425-8"},{"issue":"4","key":"3_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2018.3111245","volume":"16","author":"R Henry","year":"2018","unstructured":"Henry, R., Herzberg, A., Kate, A.: Blockchain access privacy: challenges and directions. IEEE Secur. Priv. 16(4), 38\u201345 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.3111245","journal-title":"IEEE Secur. Priv."},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology\u2014CRYPTO 2002","author":"NJ Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77\u201392. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_6"},{"unstructured":"Kucner, D., Kutylowski, M.: Stochastic kleptography detection. In: Public-Key Cryptography and Computational Number Theory, pp. 137\u2013149 (2001)","key":"3_CR19"},{"doi-asserted-by":"crossref","unstructured":"Matzutt, R., Henze, M., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Thwarting unwanted blockchain content insertion. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 364\u2013370. IEEE (2018)","key":"3_CR20","DOI":"10.1109\/IC2E.2018.00070"},{"doi-asserted-by":"publisher","unstructured":"Matzutt, R., et al.: A quantitative analysis of the impact of arbitrary blockchain content on bitcoin. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 420\u2013438. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_23","key":"3_CR21","DOI":"10.1007\/978-3-662-58387-6_23"},{"unstructured":"Mazurczyk, W., Caviglione, L.: Information hiding as a challenge for malware detection (2015). arXiv preprint arXiv:1504.04867","key":"3_CR22"},{"doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","key":"3_CR23","DOI":"10.1145\/2504730.2504747"},{"unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf","key":"3_CR24"},{"unstructured":"OpenSSL.org.: OpenSSL Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/","key":"3_CR25"},{"issue":"3","key":"3_CR26","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 18 (2018)","journal-title":"Cryptography"},{"issue":"3","key":"3_CR27","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"3_CR28","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCE.2018.2816299","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Das, G.: Everything you wanted to know about the blockchain: its promise, components, processes, and problems. IEEE Consum. Electron. Mag. 7(4), 6\u201314 (2018)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"5","key":"3_CR29","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/s40258-018-0412-8","volume":"16","author":"I Radanovi\u0107","year":"2018","unstructured":"Radanovi\u0107, I., Liki\u0107, R.: Opportunities for use of blockchain technology in medicine. Appl. Health Econ. Health Policy 16(5), 583\u2013590 (2018)","journal-title":"Appl. Health Econ. Health Policy"},{"doi-asserted-by":"crossref","unstructured":"Raggo, M.T., Hosmer, C.: Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols. Newnes (2012)","key":"3_CR30","DOI":"10.1016\/B978-1-59-749743-5.00009-2"},{"unstructured":"Richard III, G.G., Roussev, V.: Scalpel: a frugal, high performance file carver. In: DFRWS (2005)","key":"3_CR31"},{"issue":"5","key":"3_CR32","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1002\/jsc.2142","volume":"26","author":"B Scott","year":"2017","unstructured":"Scott, B., Loonam, J., Kumar, V.: Exploring the rise of blockchain technology: towards distributed collaborative organizations. Strat. Change 26(5), 423\u2013428 (2017)","journal-title":"Strat. Change"},{"issue":"3","key":"3_CR33","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"key":"3_CR35","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2017","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 7th edn. Pearson, Upper Saddle River (2017)","edition":"7"},{"doi-asserted-by":"crossref","unstructured":"Te\u015feleanu, G.: Subliminal hash channels. Cryptology ePrint Archive, Report 2019\/1112 (2019)","key":"3_CR36","DOI":"10.1007\/978-3-030-36237-9_9"},{"unstructured":"Walker, J.: Ent: a pseudorandom number sequence test program. Software and documentation (2008). http:\/\/www.fourmilab.ch\/random\/","key":"3_CR37"},{"key":"3_CR38","volume-title":"Blockchain: The Next Everything","author":"SP Williams","year":"2019","unstructured":"Williams, S.P.: Blockchain: The Next Everything. Scribner, New York (2019)"},{"issue":"8","key":"3_CR39","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.cose.2005.04.007","volume":"24","author":"CK Wu","year":"2005","unstructured":"Wu, C.K.: Hash channels. Comput. Secur. 24(8), 653\u2013661 (2005)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T05:02:18Z","timestamp":1669179738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}