Research Article

The Applications of Blockchain in the Covert Communication

Table 2

Contrast among blockchain-based covert communication channel.

SchemeTimeTypePositionEnvironmentHiding capacity (bit)/TX

Partala [31]2018Address ChannelInput addressBitcoin1
Frkat et al. [43]2018DSA ChannelSignatureBotnet256
Minaei et al. [44]2018Address ChannelOutput shielded addressZcash9344
Basuki and Rosiyadi [45]2019Value ChannelContract parameterEthereum29
Recabarren and Carbunar [46]2019DSA ChannelSignatureBitcoin13200
Alsalami and Zhang [47]2019DSA ChannelSignatureBytecoin16384
Tian et al. [33]2019Script ChannelOP_RETURNBitcoin256
Lejun et al. [32]2020Address ChannelInput addressBitcoin36
Wang and Su [40]2020Address ChannelOutput addressBitcoin34
Luo et al. [48]2020Address ChannelInteraction between address and transaction amountBitcoinUncertain
Liu et al. [36]2020Value ChannelVALUEEthereumOBE:1
Value ChannelVALUEEthereumHMAC: 0.25(ValueLength-1)
Value ChannelVALUEEthereumHash: 0.5(ValueLength-1)
Alsalami and Zhang [49]2020DSA ChannelSignatureBytecoin16384
Zhang et al. [39]2020Script ChannelWhisper payloadEthereum256
Cao et al. [38]2020Address ChannelPublic key derivationBitcoin1
Gao et al. [50]2020Script ChannelOP_RETURNBitcoin640
Zhang et al. [41]2021Value ChannelContract parameterEthereum41.8
Liu et al. [36]2022Value ChannelAmountMonero39