{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T20:54:30Z","timestamp":1774212870087,"version":"3.50.1"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11704-024-2775-2","type":"journal-article","created":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T20:37:00Z","timestamp":1731875820000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext"],"prefix":"10.1007","volume":"19","author":[{"given":"Lejun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhujun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guopeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Shen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guangxia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Gataullin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"issue":"10","key":"2775_CR1","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B W Lampson","year":"1973","unstructured":"Lampson B W. A note on the confinement problem. Communications of the ACM, 1973, 16(10): 613\u2013615","journal-title":"Communications of the ACM"},{"key":"2775_CR2","first-page":"171","volume-title":"Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure","author":"S Liu","year":"2020","unstructured":"Liu S, Fang Z, Gao F, Koussainov B, Zhang Z, Liu J, Zhu L. Whispers on Ethereum: Blockchain-based covert data embedding schemes. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure. 2020, 171\u2013179"},{"issue":"3","key":"2775_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala J. Provably secure covert communication on blockchain. Cryptography, 2018, 2(3): 18","journal-title":"Cryptography"},{"issue":"1","key":"2775_CR4","doi-asserted-by":"publisher","first-page":"597","DOI":"10.32604\/cmc.2020.011554","volume":"65","author":"L Zhang","year":"2020","unstructured":"Zhang L, Zhang Z, Wang W, Waqas R, Zhao C, Kim S, Chen H. A covert communication method using special bitcoin addresses generated by vanitygen. Computers, Materials & Continua, 2020, 65(1): 597\u2013616","journal-title":"Computers, Materials & Continua"},{"key":"2775_CR5","first-page":"324","volume-title":"Proceedings of the 35th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection","author":"W Wang","year":"2020","unstructured":"Wang W, Su C. CCBRSN: a system with high embedding capacity for covert communication in bitcoin. In: Proceedings of the 35th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection. 2020, 324\u2013337"},{"issue":"4","key":"2775_CR6","doi-asserted-by":"publisher","first-page":"2830","DOI":"10.1109\/TII.2021.3100480","volume":"18","author":"X Luo","year":"2022","unstructured":"Luo X, Zhang P, Zhang M, Li H, Cheng Q. A novel covert communication method based on bitcoin transaction. IEEE Transactions on Industrial Informatics, 2022, 18(4): 2830\u20132839","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2775_CR7","first-page":"41","volume-title":"Proceedings of 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","author":"A I Basuki","year":"2019","unstructured":"Basuki A I, Rosiyadi D. Joint transaction-image steganography for high capacity covert communication. In: Proceedings of 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA). 2019, 41\u201346"},{"issue":"2","key":"2775_CR8","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.001.1900225","volume":"34","author":"F Gao","year":"2020","unstructured":"Gao F, Zhu L, Gai K, Zhang C, Liu S. Achieving a covert channel over an open blockchain network. IEEE Network, 2020, 34(2): 6\u201313","journal-title":"IEEE Network"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-024-2775-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-024-2775-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-024-2775-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T20:27:03Z","timestamp":1774211223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-024-2775-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["2775"],"URL":"https:\/\/doi.org\/10.1007\/s11704-024-2775-2","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"20 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Competing interests\n                      The authors declare that they have no competing interests or financial conflicts to disclose.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}],"article-number":"192807"}}