{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:00:33Z","timestamp":1760576433148,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_6","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:08Z","timestamp":1760555888000},"page":"87-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Covert Channels in\u00a0Bitcoin: Concealing Senders via\u00a0Transaction Behavior Mimicry"],"prefix":"10.1007","author":[{"given":"Xudong","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"5","key":"6_CR1","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1037\/h0024529","volume":"67","author":"R Rosenthal","year":"1967","unstructured":"Rosenthal, R.: Covert communication in the psychological experiment. Psychol. Bull. 67(5), 356\u201367 (1967)","journal-title":"Psychol. Bull."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Annual International Cryptology Conference, 1983","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"6_CR3","unstructured":"Zhang, T., Wu, Q., Zongxun, T.: Bitcoin blockchain based information convert transmission. Chin. J. Netw. Inf. Secur. 7(1), 84\u201392 (2021)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Z., et al.: Blockchain meets covert communication: a survey. IEEE Commun. Surv. Tutor. 24, 2163\u20132192 (2022)","DOI":"10.1109\/COMST.2022.3204281"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Sleiman, M.D., Lauf, A.P., Yampolskiy, R.: Bitcoin message: data insertion on a proof-of-work cryptocurrency system. In: 2015 International Conference on Cyberworlds (CW), pp. 332\u2013336, 2015","DOI":"10.1109\/CW.2015.56"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fionov, A.: Exploring covert channels in bitcoin transactions. In: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), pp. 0059\u20130064, 2019","DOI":"10.1109\/SIBIRCON48586.2019.8957861"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, T., Li, B., Zhu, Y., Han, T., Wu, Q.: Covert channels in blockchain and blockchain based covert communication: overview, state-of-the-art, and future directions. Comput. Commun. 205, 136\u2013146 (2023)","DOI":"10.1016\/j.comcom.2023.04.001"},{"issue":"2","key":"6_CR8","first-page":"143","volume":"6","author":"LV Jingshu","year":"2021","unstructured":"Jingshu, L.V., Xiaochun, C.A.O.: Covert communication technology based on bitcoin. J. Cyber Secur. 6(2), 143\u2013152 (2021)","journal-title":"J. Cyber Secur."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TIFS.2023.3347895","volume":"19","author":"Z Guo","year":"2024","unstructured":"Guo, Z., et al.: Graph-based covert transaction detection and protection in blockchain. IEEE Trans. Inf. Forensics Secur. 19, 2244\u20132257 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Multi-class bitcoin-enabled service identification based on transaction history summarization. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1153\u20131160, 2018","DOI":"10.1109\/Cybermatics_2018.2018.00208"},{"key":"6_CR11","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter. ArXiv, abs\/1910.01108, 2019"},{"key":"6_CR12","unstructured":"Zhao, Z., Birke, R., Chen, L.Y.: Tabula: harnessing language models for tabular data synthesis. ArXiv, abs\/2310.12746, 2023"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"An, J., Tian, H.: Embedding data in bitcoin transaction values with restricted boltzmann machine. In: DSPP, 2024","DOI":"10.1007\/978-981-97-8540-7_2"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptogr. 2, 18 (2018)","journal-title":"Cryptogr."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhang, P., Zhang, M., Li, H., Cheng, Q.: A novel covert communication method based on bitcoin transaction. IEEE Trans. Ind. Inform. 18, 2830\u20132839 (2022)","DOI":"10.1109\/TII.2021.3100480"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Tian, J., Gou, G., Liu, C., Chen, Y., Xiong, G., Li, Z.: Dlchain: a covert channel over blockchain based on dynamic labels. In: International Conference on Information, Communications and Signal Processing, 2019","DOI":"10.1007\/978-3-030-41579-2_47"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Sabiri, B., Khtira, A., El Asri, B., Rhanoui, M.: Analyzing BERT\u2019s performance compared to traditional text classification models. In: Proceedings of the 25th International Conference on Enterprise Information Systems (ICEIS 2023) - Volume 1, pp. 572\u2013582. SCITEPRESS \u2013 Science and Technology Publications, Lda., 2023","DOI":"10.5220\/0011983100003467"},{"key":"6_CR18","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. In: North American Chapter of the Association for Computational Linguistics, 2019"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Donet Donet, J.A., P\u00e9rez-Sola, C., Herrera-Joancomart\u00ed, J.: The bitcoin p2p network. In: Financial Cryptography Workshops, 2014","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Sleiman, M.D., Lauf, A.P., Yampolskiy, R.: Bitcoin message: data insertion on a proof-of-work cryptocurrency system. In: 2015 International Conference on Cyberworlds (CW), pp. 332\u2013336, 2015","DOI":"10.1109\/CW.2015.56"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Whispers on ethereum: blockchain-based covert data embedding schemes. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020","DOI":"10.1145\/3384943.3409433"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:13Z","timestamp":1760555893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}