Research Article

Covert Communication Scheme Based on Bitcoin Transaction Mechanism

Algorithm 2

Secret information embedding.
Input: Key K, symmetric key k, secret information m.
Output: The ID of the special transaction ID_Ts.
(1);
(2); /∗K and k are negotiated in advance ∗/
(3); /∗Random generation∗/
(4);
(5);
(6);
(7);
(8);
(9);
(10)return ID_Ts;
(11)end;