{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:01:11Z","timestamp":1760576471308,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_9","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:58Z","timestamp":1760555938000},"page":"140-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evading AI-Based Detectors: A Hybrid Covert Communication Method Based on\u00a0Ethereum Transaction Amount and\u00a0Address"],"prefix":"10.1007","author":[{"given":"Jinze","family":"Du","sequence":"first","affiliation":[]},{"given":"Chundong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lihai","family":"Nie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Information Hiding","author":"TG Handel","year":"1996","unstructured":"Handel, T.G., Sandford, M.T.: Hiding data in the OSI network model. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 23\u201338. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61996-8_29"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: Covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutor. 9(4), 44\u201357 (2007)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Wendzel, S., Zander, S., Fechner, B., et al.: Pattern-based survey and categorization of network covert channel techniques. ACM Comput. Surv. 47(3) (2023)","DOI":"10.1145\/2684195"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/JPROC.2024.3364256","volume":"112","author":"YE Jiang","year":"2023","unstructured":"Jiang, Y.E., Wang, L.M., Chen, H.H., et al.: Physical layer covert communication in B5G wireless networks-its research, applications, and challenges. Proc. IEEE 112(1), 47\u201382 (2023)","journal-title":"Proc. IEEE"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MWC.003.2300323","volume":"31","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Arrazola, J.M., Liu, W.Z., et al.: Experimental covert communication over metropolitan fibre optical links. IEEE Wirel. Commun. 31(4), 76\u201380 (2024)","journal-title":"IEEE Wirel. Commun."},{"issue":"5","key":"9_CR6","doi-asserted-by":"publisher","first-page":"7378","DOI":"10.1109\/TVT.2025.3529460","volume":"74","author":"W Tian","year":"2025","unstructured":"Tian, W., Fan, H., Liu, G.J., et al.: Contract-based incentive mechanisms for UAV networks in covert communications. IEEE Trans. Veh. Technol. 74(5), 7378\u20137391 (2025)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"9_CR7","first-page":"21268","volume":"28","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 28(1), 21268 (2008)","journal-title":"Consulted"},{"issue":"9","key":"9_CR8","first-page":"209","volume":"43","author":"LX Li","year":"2022","unstructured":"Li, L.X., Du, J.Z., Lin, H., et al.: Research progress of blockchain network covert channel. J. Commun. 43(9), 209\u2013223 (2022)","journal-title":"J. Commun."},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSUSC.2023.3303180","volume":"8","author":"T Zhang","year":"2025","unstructured":"Zhang, T.: Privacy evaluation of blockchain based privacy cryptocurrencies: a comparative analysis of Dash, Monero, Verge, Zcash, and Grin. IEEE Trans. Sustain. Comput. 8(4), 574\u2013582 (2025)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comcom.2023.04.001","volume":"205","author":"T Zhang","year":"2023","unstructured":"Zhang, T., Li, B., Zhu, Y., Han, T., Wu, Q.: Covert channels in blockchain and blockchain based covert communication: overview, state-of-the-art, and future directions. Comput. Commun. 205, 136\u2013146 (2023)","journal-title":"Comput. Commun."},{"issue":"4","key":"9_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimed. 8(4), 22\u201328 (2001)","journal-title":"IEEE Multimed."},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TIFS.2023.3347895","volume":"19","author":"Z Guo","year":"2024","unstructured":"Guo, Z., et al.: Graph-based covert transaction detection and protection in blockchain. IEEE Trans. Inf. Forensics Secur. 19, 2244\u20132257 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 18 (2018)","journal-title":"Cryptography"},{"issue":"1","key":"9_CR14","doi-asserted-by":"crossref","first-page":"495","DOI":"10.32604\/cmc.2020.011278","volume":"65","author":"L Zhang","year":"2020","unstructured":"Zhang, L., et al.: A covert communication method using special bitcoin addresses generated by Vanitygen. Comput. Mater. Continua 65(1), 495\u2013510 (2020)","journal-title":"Comput. Mater. Continua"},{"issue":"16","key":"9_CR15","doi-asserted-by":"publisher","first-page":"14699","DOI":"10.1109\/JIOT.2020.3040389","volume":"9","author":"H Cao","year":"2022","unstructured":"Cao, H., et al.: Chain-based covert data embedding schemes in blockchain. IEEE Internet Things J. 9(16), 14699\u201314707 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"9_CR16","first-page":"2830","volume":"18","author":"X Luo","year":"2021","unstructured":"Luo, X., Zhang, P., Zhang, M., et al.: A novel covert communication method based on bitcoin transaction. IEEE Trans. Industr. Inf. 18(4), 2830\u20132839 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"9_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109843","volume":"232","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Zhang, L., Guo, R., et al.: A covert channel over blockchain based on label tree without long waiting times. Comput. Netw. 232, 109843 (2023)","journal-title":"Comput. Netw."},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.1109\/JSYST.2021.3057333","volume":"16","author":"L Zhang","year":"2022","unstructured":"Zhang, L., et al.: Research on a covert communication model realized by using smart contracts in blockchain environment. IEEE Syst. J. 16(2), 2822\u20132833 (2022)","journal-title":"IEEE Syst. J."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Fionov, A.: Exploring covert channels in Bitcoin transactions. In: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), pp. 59\u201364 (2019)","DOI":"10.1109\/SIBIRCON48586.2019.8957861"},{"issue":"2","key":"9_CR20","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.001.1900225","volume":"34","author":"F Gao","year":"2020","unstructured":"Gao, F., et al.: Achieving a covert channel over an open blockchain network. IEEE Netw. 34(2), 6\u201313 (2020)","journal-title":"IEEE Netw."},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"31816","DOI":"10.1109\/ACCESS.2021.3060285","volume":"9","author":"Z Guo","year":"2021","unstructured":"Guo, Z., et al.: MRCC: a practical covert channel over monero with provable security. IEEE Access 9, 31816\u201331825 (2021)","journal-title":"IEEE Access"},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1002\/int.22327","volume":"36","author":"L Zhang","year":"2020","unstructured":"Zhang, L., et al.: An approach of covert communication based on the Ethereum whisper protocol in blockchain. Int. J. Intell. Syst. 36(2), 962\u2013996 (2020)","journal-title":"Int. J. Intell. Syst."},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: The research on covert communication model based on blockchain: a case study of Ethereum\u2019s whisper protocol. Front. Cyber Secur. 215\u2013230 (2020)","DOI":"10.1007\/978-981-15-9739-8_17"},{"issue":"1","key":"9_CR24","doi-asserted-by":"publisher","first-page":"68","DOI":"10.2478\/popets-2019-0005","volume":"2019","author":"R Recabarren","year":"2019","unstructured":"Recabarren, R., Carbunar, B.: Tithonus: a bitcoin based censorship resilient system. Proc. Privacy Enhancing Technol. 2019(1), 68\u201386 (2019)","journal-title":"Proc. Privacy Enhancing Technol."},{"issue":"10","key":"9_CR25","doi-asserted-by":"publisher","first-page":"2913","DOI":"10.1109\/TC.2023.3275096","volume":"72","author":"L Zhu","year":"2023","unstructured":"Zhu, L., Liu, Q., Chen, Z., et al.: A novel covert timing channel based on bitcoin messages. IEEE Trans. Comput. 72(10), 2913\u20132924 (2023)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"9_CR26","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1109\/TNSE.2025.3539909","volume":"12","author":"Z Chen","year":"2025","unstructured":"Chen, Z., Zhu, L.H., Jiang, P., et al.: Tackling data mining risks: a tripartite covert channel merging blockchain and IPFS. IEEE Trans. Netw. Sci. Eng. 12(3), 1831\u20131848 (2025)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"6","key":"9_CR27","doi-asserted-by":"publisher","first-page":"6889","DOI":"10.1109\/JIOT.2024.3491431","volume":"12","author":"YE Jiang","year":"2025","unstructured":"Jiang, Y.E., Wang, Y.T., Wu, H.Q., et al.: Energy-efficient covert offloading in blockchain-enabled IoT: joint artificial noise and computation resource allocation. IEEE Internet Things J. 12(6), 6889\u20136901 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"9_CR28","doi-asserted-by":"publisher","first-page":"4469","DOI":"10.1109\/TDSC.2024.3353570","volume":"21","author":"P Zhang","year":"2025","unstructured":"Zhang, P., Cheng, Q.F., Zhang, M.L., et al.: A blockchain-based secure covert communication method via Shamir threshold and STC mapping. IEEE Trans. Dependable Secure Comput. 21(5), 4469\u20134480 (2025)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:19:01Z","timestamp":1760555941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}