{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:29:28Z","timestamp":1766068168663,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615247"},{"type":"electronic","value":"9789819615254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1525-4_9","type":"book-chapter","created":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:28:11Z","timestamp":1739698091000},"page":"161-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with\u00a0Strong Ability to\u00a0Evade Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2668-4458","authenticated-orcid":false,"given":"Zehui","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1611-9167","authenticated-orcid":false,"given":"Yuwei","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2239-6700","authenticated-orcid":false,"given":"Ranfeng","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4344-6698","authenticated-orcid":false,"given":"Xinhe","family":"Fan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2173-4076","authenticated-orcid":false,"given":"Jingdong","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8642-4362","authenticated-orcid":false,"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comcom.2023.04.001","volume":"205","author":"T Zhang","year":"2023","unstructured":"Zhang, T., Li, B., Zhu, Y., Han, T., Wu, Q.: Covert channels in blockchain and blockchain based covert communication: overview, state-of-the-art, and future directions. Comput. Commun. 205, 136\u2013146 (2023)","journal-title":"Comput. Commun."},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/COMST.2022.3204281","volume":"24","author":"Z Chen","year":"2022","unstructured":"Chen, Z., et al.: Blockchain meets covert communication: a survey. IEEE Commun. Surv. Tutor. 24(4), 2163\u20132192 (2022)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 1\u201318 (2018)","journal-title":"Cryptography"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"597","DOI":"10.32604\/cmc.2020.011554","volume":"65","author":"L Zhang","year":"2020","unstructured":"Zhang, L., et al.: A covert communication method using special bitcoin addresses generated by vanitygen. Comput. Mater. Continua 65(1), 597\u2013616 (2020)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.001.1900225","volume":"34","author":"F Gao","year":"2020","unstructured":"Gao, F., Zhu, L., Gai, K., Zhang, C., Liu, S.: Achieving a covert channel over an open blockchain network. IEEE Network 34(2), 6\u201313 (2020)","journal-title":"IEEE Network"},{"doi-asserted-by":"crossref","unstructured":"Tian, J., Gou, G., Liu, C., Chen, Y., Xiong, G., Li, Z.: Dlchain: a covert channel over blockchain based on dynamic labels. In: Proceedings of the 21th International Conference on Information and Communications Security, pp. 814\u2013830 (2020)","key":"9_CR6","DOI":"10.1007\/978-3-030-41579-2_47"},{"issue":"4","key":"9_CR7","first-page":"2830","volume":"18","author":"X Luo","year":"2021","unstructured":"Luo, X., Zhang, P., Zhang, M., Li, H., Cheng, Q.: A novel covert communication method based on bitcoin transaction. IEEE Trans. Industr. Inf. 18(4), 2830\u20132839 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.1109\/TNSM.2024.3358013","volume":"21","author":"Y Tian","year":"2024","unstructured":"Tian, Y., Liao, X., Dong, L., Xu, Y., Jiang, H.: Amount-based covert communication over blockchain. IEEE Trans. Netw. Serv. Manage. 21(3), 3095\u20133111 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"doi-asserted-by":"crossref","unstructured":"Zhang, P., Cheng, Q., Zhang, M., Luo, X.: A blockchain-based secure covert communication method via shamir threshold and STC mapping. IEEE Trans. Dependable Secure Comput. 1\u201312 (2024)","key":"9_CR9","DOI":"10.1109\/TDSC.2024.3353570"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"3380","DOI":"10.1109\/TIFS.2024.3361212","volume":"19","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Zhu, L., Jiang, P., Zhang, C., Gao, F., Guo, F.: Exploring unobservable blockchain-based covert channel for censorship-resistant systems. IEEE Trans. Inf. Forensics Secur. 19, 3380\u20133394 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"9_CR11","doi-asserted-by":"publisher","first-page":"2913","DOI":"10.1109\/TC.2023.3275096","volume":"72","author":"L Zhu","year":"2023","unstructured":"Zhu, L., Liu, Q., Chen, Z., Zhang, C., Gao, F., Yang, Z.: A novel covert timing channel based on bitcoin messages. IEEE Trans. Comput. 72(10), 2913\u20132924 (2023)","journal-title":"IEEE Trans. Comput."},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TIFS.2023.3347895","volume":"19","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Li, X., Liu, J., Zhang, Z., Li, M., Hu, J., Zhu, L.: Graph-based covert transaction detection and protection in blockchain. IEEE Trans. Inf. Forensics Secur. 19, 2244\u20132257 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"9_CR13","doi-asserted-by":"publisher","first-page":"5156","DOI":"10.1109\/TDSC.2023.3241451","volume":"20","author":"S Zillien","year":"2023","unstructured":"Zillien, S., Wendzel, S.: Weaknesses of popular and recent covert channel detection methods and a remedy. IEEE Trans. Dependable Secure Comput. 20(6), 5156\u20135167 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"9_CR14","doi-asserted-by":"publisher","first-page":"4266","DOI":"10.1109\/TNSE.2022.3196816","volume":"9","author":"P Zhang","year":"2022","unstructured":"Zhang, P., Cheng, Q., Zhang, M., Luo, X.: A group covert communication method of digital currency based on blockchain technology. IEEE Trans. Network Sci. Eng. 9(6), 4266\u20134276 (2022)","journal-title":"IEEE Trans. Network Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Whispers on ethereum: blockchain-based covert data embedding schemes. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 171\u2013179 (2020)","key":"9_CR15","DOI":"10.1145\/3384943.3409433"},{"key":"9_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103541","volume":"210","author":"C Zhang","year":"2023","unstructured":"Zhang, C., Zhu, L., Xu, C., Zhang, Z., Lu, R.: EBDL: effective blockchain-based covert storage channel with dynamic labels. J. Netw. Comput. Appl. 210, 103541 (2023)","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Wu, Z., Cao, J., Xu, J., Cheng, G.: Darktrans: a blockchain-based covert communication scheme with high channel capacity and strong concealment. In: Proceedings of the IEEE 29th International Conference on Parallel and Distributed Systems, pp. 675\u2013682 (2023)","key":"9_CR17","DOI":"10.1109\/ICPADS60453.2023.00104"},{"issue":"11","key":"9_CR18","doi-asserted-by":"publisher","first-page":"2926","DOI":"10.1093\/comjnl\/bxac090","volume":"65","author":"M Wang","year":"2022","unstructured":"Wang, M., et al.: Practical blockchain-based steganographic communication via adversarial AI: a case study in bitcoin. Comput. J. 65(11), 2926\u20132938 (2022)","journal-title":"Comput. J."},{"unstructured":"Blockchair. https:\/\/blockchair.com\/dumps. Accessed 20 May 2024","key":"9_CR19"},{"unstructured":"Xu, L., Skoularidou, M., Cuesta-Infante, A., Veeramachaneni, K.: Modeling tabular data using conditional GAN. In: Proceedings of the annual Conference on Neural Information Processing Systems 2019, pp. 7333\u20137343 (2019)","key":"9_CR20"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1525-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:28:34Z","timestamp":1739698114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1525-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615247","9789819615254"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1525-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}