Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology

Authors

  • Ayushi Chaudhary GLA UNIVERSITY Mathura
  • Ashish Sharma GLA UNIVERSITY Mathura
  • Neeraj Gupta GLA UNIVERSITY Mathura

Keywords:

Blockchain, stego cryptography, machine learning, decentralization

Abstract

Recently, Blockchain technology has become popular. Through a highly secure, decentralized system enabled by this technology, anyone can transact securely without the need for a middleman. Machine learning can assist in addressing many of the constraints that Blockchain-based systems have in addition to their own potential. Machine learning and Blockchain technology can be combined to produce effective and practical outcomes. The infrastructures, resources, end devices, and applications in communications and networking systems are becoming increasingly more complicated and heterogeneous recently due to the rapid growth of information and communication technology. Additionally, the enormous amount of data and numerous endpoints could pose significant security, privacy, delivery of services, and network management difficulties. The combination consideration of Blockchain and Machine Learning is necessary to accomplish decentralized, secure, intelligent, and effective network operation and management (ML). This article will explain Blockchain technology and examine how machine learning capabilities can be combined with a Blockchain-based system to build a stego cryptography to secure the data during communication over the network.

Downloads

Download data is not yet available.

References

Underwood, Sarah. "Blockchain beyond bitcoin." Communications of the ACM 59, no. 11 (2016): 15-17.

Shahaab, Ali, Ross Maude, Chaminda Hewage, and Imtiaz Khan. "Blockchain-a panacea for trust challenges in public services? A socio-technical perspective." The Journal of the British Blockchain Association (2020): 14128.

Ali, Muhammad Salek, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, and Mubashir Husain Rehmani. "Applications of blockchains in the Internet of Things: A comprehensive survey." IEEE Communications Surveys & Tutorials 21, no. 2 (2018): 1676- 1717.

Troncoso, Carmela, Marios Isaakidis, George Danezis, and Harry Halpin. "Systematizing decentralization and privacy: Lessons from 15 years of research and deployments." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 404-426.

Lin, Iuon-Chang, and Tzu-Chun Liao. "A survey of blockchain security issues and challenges." Int. J. Netw. Secur. 19, no.5 (2017): 653-659.

Komalavalli, C., Deepika Saxena, and Chetna Laroiya. "Overview of blockchain technology concepts." In Handbook of Research on Blockchain Technology, pp. 349-371. Academic Press, 2020.

Chaum, David Lee. Computer Systems established, maintained and trusted by mutually suspicious groups. Electronics Research Laboratory, University of California, 1979.

Haber, Stuart, and W. Scott Stornetta. "How to time-stamp a digital document." In Conference on the Theory and Application of Cryptography, pp. 437-455. Springer, Berlin, Heidelberg, 1990.

Bayer, Dave, Stuart Haber, and W. Scott Stornetta. "Improving the efficiency and reliability of digital time-stamping." In Sequences Ii, pp. 329-334. Springer, New York, NY, 1993.

Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Decentralized Business Review (2008): 21260.

Sheldon, R. "A timeline and history of blockchain technology." URL: https://www. techtarget. com/whatis/feature/A timeline-and-history-of-blockchain-technology (2021).

Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Decentralized Business Review (2008): 21260.

Zhao, Hongguo, Yunxia Liu, Yonghao Wang, Xiaoming Wang, and Jiaxuan Li. "A blockchain-based data hiding method for data protection in digital video." In International Conference on Smart Blockchain, pp. 99-110. Springer, Cham, 2018.

Nelaturu, Keerthi, Han Du, and Duc-Phong Le. "A Review of Blockchain in Fintech:Taxonomy, Challenges, and Future Directions." Cryptography 6, no. 2 (2022): 18.

Mohsin, Ali H., A. A. Zaidan, B. B. Zaidan, K. I. Mohammed, Osamah Shihab Albahri, Ahmed Shihab Albahri, and M. A. Alsalem. "PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture." Multimedia tools and applications 80, no. 9 (2021): 14137-14161.

Elisa, Noe, Longzhi Yang, Fei Chao, and Yi Cao. "A framework of blockchain-based secure and privacy-preserving E-government system." Wireless networks (2018): 1-11.

Liu, Si, Yunxia Liu, Cong Feng, Hongguo Zhao, and Yu Huang. "Blockchain privacy data protection method based on HEVC video steganography." In 2020 3rd International Conference on Smart BlockChain (SmartBlock), pp. 1-6. IEEE, 2020.

Sarkar, Proton, Sudipta Kumar Ghosal, and Madhulina Sarkar. "Stego-chain: A framework to mine encoded stego-block in a decentralized network." Journal of King Saud University- Computer and Information Sciences (2020).

Alizadeh, Morteza, Karl Andersson, and Olov Schelén. "DHT-and blockchain-based smart identification for video conferencing." Blockchain: Research and Applications 3, no. 2 (2022): 100066.

Liu, Yiming, F. Richard Yu, Xi Li, Hong Ji, and Victor CM Leung. "Blockchain and machine learning for communications and networking systems." IEEE Communications Surveys & Tutorials 22, no. 2 (2020): 1392-1431.

L. Samuel, “Some studies in machine learning using the game of checkers,” IBM Journal of research and development, vol. 44, no. 1.2, pp. 210–229, 1959.

Stoica, Ion, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, and Hari Balakrishnan. "Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11, no. 1 (2003): 17-32.

Alizadeh, Morteza, Karl Andersson, and Olov Schelén. "Efficient decentralized data storage based on public blockchain and IPFS." In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), pp. 1-8. IEEE, 2020.

Machine Learning Model Workflow

Downloads

Published

27.01.2023

How to Cite

Chaudhary, A. ., Sharma, A. ., & Gupta, N. . (2023). Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 96–103. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2512

Issue

Section

Research Article

Most read articles by the same author(s)