Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology
Keywords:
Blockchain, stego cryptography, machine learning, decentralizationAbstract
Recently, Blockchain technology has become popular. Through a highly secure, decentralized system enabled by this technology, anyone can transact securely without the need for a middleman. Machine learning can assist in addressing many of the constraints that Blockchain-based systems have in addition to their own potential. Machine learning and Blockchain technology can be combined to produce effective and practical outcomes. The infrastructures, resources, end devices, and applications in communications and networking systems are becoming increasingly more complicated and heterogeneous recently due to the rapid growth of information and communication technology. Additionally, the enormous amount of data and numerous endpoints could pose significant security, privacy, delivery of services, and network management difficulties. The combination consideration of Blockchain and Machine Learning is necessary to accomplish decentralized, secure, intelligent, and effective network operation and management (ML). This article will explain Blockchain technology and examine how machine learning capabilities can be combined with a Blockchain-based system to build a stego cryptography to secure the data during communication over the network.
Downloads
References
Underwood, Sarah. "Blockchain beyond bitcoin." Communications of the ACM 59, no. 11 (2016): 15-17.
Shahaab, Ali, Ross Maude, Chaminda Hewage, and Imtiaz Khan. "Blockchain-a panacea for trust challenges in public services? A socio-technical perspective." The Journal of the British Blockchain Association (2020): 14128.
Ali, Muhammad Salek, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, and Mubashir Husain Rehmani. "Applications of blockchains in the Internet of Things: A comprehensive survey." IEEE Communications Surveys & Tutorials 21, no. 2 (2018): 1676- 1717.
Troncoso, Carmela, Marios Isaakidis, George Danezis, and Harry Halpin. "Systematizing decentralization and privacy: Lessons from 15 years of research and deployments." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 404-426.
Lin, Iuon-Chang, and Tzu-Chun Liao. "A survey of blockchain security issues and challenges." Int. J. Netw. Secur. 19, no.5 (2017): 653-659.
Komalavalli, C., Deepika Saxena, and Chetna Laroiya. "Overview of blockchain technology concepts." In Handbook of Research on Blockchain Technology, pp. 349-371. Academic Press, 2020.
Chaum, David Lee. Computer Systems established, maintained and trusted by mutually suspicious groups. Electronics Research Laboratory, University of California, 1979.
Haber, Stuart, and W. Scott Stornetta. "How to time-stamp a digital document." In Conference on the Theory and Application of Cryptography, pp. 437-455. Springer, Berlin, Heidelberg, 1990.
Bayer, Dave, Stuart Haber, and W. Scott Stornetta. "Improving the efficiency and reliability of digital time-stamping." In Sequences Ii, pp. 329-334. Springer, New York, NY, 1993.
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Decentralized Business Review (2008): 21260.
Sheldon, R. "A timeline and history of blockchain technology." URL: https://www. techtarget. com/whatis/feature/A timeline-and-history-of-blockchain-technology (2021).
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Decentralized Business Review (2008): 21260.
Zhao, Hongguo, Yunxia Liu, Yonghao Wang, Xiaoming Wang, and Jiaxuan Li. "A blockchain-based data hiding method for data protection in digital video." In International Conference on Smart Blockchain, pp. 99-110. Springer, Cham, 2018.
Nelaturu, Keerthi, Han Du, and Duc-Phong Le. "A Review of Blockchain in Fintech:Taxonomy, Challenges, and Future Directions." Cryptography 6, no. 2 (2022): 18.
Mohsin, Ali H., A. A. Zaidan, B. B. Zaidan, K. I. Mohammed, Osamah Shihab Albahri, Ahmed Shihab Albahri, and M. A. Alsalem. "PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture." Multimedia tools and applications 80, no. 9 (2021): 14137-14161.
Elisa, Noe, Longzhi Yang, Fei Chao, and Yi Cao. "A framework of blockchain-based secure and privacy-preserving E-government system." Wireless networks (2018): 1-11.
Liu, Si, Yunxia Liu, Cong Feng, Hongguo Zhao, and Yu Huang. "Blockchain privacy data protection method based on HEVC video steganography." In 2020 3rd International Conference on Smart BlockChain (SmartBlock), pp. 1-6. IEEE, 2020.
Sarkar, Proton, Sudipta Kumar Ghosal, and Madhulina Sarkar. "Stego-chain: A framework to mine encoded stego-block in a decentralized network." Journal of King Saud University- Computer and Information Sciences (2020).
Alizadeh, Morteza, Karl Andersson, and Olov Schelén. "DHT-and blockchain-based smart identification for video conferencing." Blockchain: Research and Applications 3, no. 2 (2022): 100066.
Liu, Yiming, F. Richard Yu, Xi Li, Hong Ji, and Victor CM Leung. "Blockchain and machine learning for communications and networking systems." IEEE Communications Surveys & Tutorials 22, no. 2 (2020): 1392-1431.
L. Samuel, “Some studies in machine learning using the game of checkers,” IBM Journal of research and development, vol. 44, no. 1.2, pp. 210–229, 1959.
Stoica, Ion, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, and Hari Balakrishnan. "Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11, no. 1 (2003): 17-32.
Alizadeh, Morteza, Karl Andersson, and Olov Schelén. "Efficient decentralized data storage based on public blockchain and IPFS." In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), pp. 1-8. IEEE, 2020.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ayushi Chaudhary, Ashish Sharma, Neeraj Gupta
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.