Sensing Data Concealment in NFTs: A Steganographic Model for Confidential Cross-Border Information Exchange

被引:1
|
作者
Al-Sumaidaee, Ghassan [1 ]
Zilic, Zeljko [1 ]
机构
[1] McGill Univ, Dept Elect & Comp Engn, Montreal, PQ H3A 0G4, Canada
关键词
NFTs; blockchain; steganography;
D O I
10.3390/s24041264
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In an era dominated by rapid digitalization of sensed data, the secure exchange of sensitive information poses a critical challenge across various sectors. Established techniques, particularly in emerging technologies like the Internet of Things (IoT), grapple with inherent risks in ensuring data confidentiality, integrity, and vulnerabilities to evolving cyber threats. Blockchain technology, known for its decentralized and tamper-resistant characteristics, stands as a reliable solution for secure data exchange. However, the persistent challenge lies in protecting sensitive information amidst evolving digital landscapes. Among the burgeoning applications of blockchain technology, non-fungible tokens (NFTs) have emerged as digital certificates of ownership, securely recording various types of data on a distributed ledger. Unlike traditional data storage methods, NFTs offer several advantages for secure information exchange. Firstly, their tamperproof nature guarantees the authenticity and integrity of the data. Secondly, NFTs can hold both immutable and mutable data within the same token, simplifying management and access control. Moving beyond their conventional association with art and collectibles, this paper presents a novel approach that utilizes NFTs as dynamic carriers for sensitive information. Our solution leverages the immutable NFT data to serve as a secure data pointer, while the mutable NFT data holds sensitive information protected by steganography. Steganography embeds the data within the NFT, making them invisible to unauthorized eyes, while facilitating portability. This dual approach ensures both data integrity and authorized access, even in the face of evolving digital threats. A performance analysis confirms the approach's effectiveness, demonstrating its reliability, robustness, and resilience against attacks on hidden data. This paves the way for secure data transmission across diverse industries.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe
    Papakonstantinou, Vagelis
    COMMON MARKET LAW REVIEW, 2016, 53 (02): : 589 - 591
  • [2] Development of an automated system model of information protection in the cross-border exchange
    Yenlik, Begimbayeva
    Olga, Ussatova
    Rustem, Biyashev
    Saule, Nyssanbayeva
    COGENT ENGINEERING, 2020, 7 (01):
  • [3] Cross-Border Exchange of Information and Cooperation Between Insurance Supervisors
    Peter Braumüller
    The Geneva Papers on Risk and Insurance - Issues and Practice, 2007, 32 : 301 - 318
  • [4] Cross-border exchange of information and cooperation between insurance supervisors
    Braumueller, Peter
    GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2007, 32 (03): : 301 - 318
  • [5] Development of the model of protected cross-border information interaction
    Biyashev, R. G.
    Nyssanbayeva, S. E.
    Begimbayeva, Ye. Y.
    OPEN ENGINEERING, 2016, 6 (01): : 199 - 205
  • [6] Intraday herding on a cross-border exchange
    Andrikopoulos, Panagiotis
    Kallinterakis, Vasileios
    Leite Ferreira, Mario Pedro
    Verousis, Thanos
    INTERNATIONAL REVIEW OF FINANCIAL ANALYSIS, 2017, 53 : 25 - 36
  • [7] The European Cross-Border Health Data Exchange: Focus on Clinically Relevant Data
    Palojoki, Sari
    Vakkuri, Anne
    Vuokko, Riikka
    PUBLIC HEALTH AND INFORMATICS, PROCEEDINGS OF MIE 2021, 2021, 281 : 442 - 446
  • [8] CROSS-BORDER DATA COMPARISONS
    OJALA, M
    ONLINE, 1994, 18 (03): : 105 - 107
  • [9] Citizen Perspectives on Cross-Border eHealth Data Exchange: A European Survey
    Natsiavas, Pantelis
    Kakalou, Christine
    Votis, Kostas
    Tzovaras, Dimitrios
    Koutkias, Vassilis
    MEDINFO 2019: HEALTH AND WELLBEING E-NETWORKS FOR ALL, 2019, 264 : 719 - 723
  • [10] Secure Cross-border Exchange of Health Related Data: the KONFIDO Approach
    Diamantopoulos, Sotiris
    Karamitros, Dimitris
    Romano, Luigi
    Coppolino, Luigi
    Koutkias, Vassilis
    Votis, Kostas
    Stan, Oana
    Campegiani, Paolo
    Martinez, David Mari
    Nalin, Marco
    Baroni, Ilaria
    Clemente, Fabrizio
    Faiella, Giuliana
    Mesaritakis, Charis
    Grivas, Evangelos
    Rasmussen, Janne
    MedCom, Jan Petersen
    Cano, Isaac
    Puigdomenech, Elisa
    Gelenbe, Erol
    Dumortier, Jos
    Voss-KnudeVoronkov, Maja
    2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019), 2019, : 73 - 74