Sensing Data Concealment in NFTs: A Steganographic Model for Confidential Cross-Border Information Exchange

被引:1
|
作者
Al-Sumaidaee, Ghassan [1 ]
Zilic, Zeljko [1 ]
机构
[1] McGill Univ, Dept Elect & Comp Engn, Montreal, PQ H3A 0G4, Canada
关键词
NFTs; blockchain; steganography;
D O I
10.3390/s24041264
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In an era dominated by rapid digitalization of sensed data, the secure exchange of sensitive information poses a critical challenge across various sectors. Established techniques, particularly in emerging technologies like the Internet of Things (IoT), grapple with inherent risks in ensuring data confidentiality, integrity, and vulnerabilities to evolving cyber threats. Blockchain technology, known for its decentralized and tamper-resistant characteristics, stands as a reliable solution for secure data exchange. However, the persistent challenge lies in protecting sensitive information amidst evolving digital landscapes. Among the burgeoning applications of blockchain technology, non-fungible tokens (NFTs) have emerged as digital certificates of ownership, securely recording various types of data on a distributed ledger. Unlike traditional data storage methods, NFTs offer several advantages for secure information exchange. Firstly, their tamperproof nature guarantees the authenticity and integrity of the data. Secondly, NFTs can hold both immutable and mutable data within the same token, simplifying management and access control. Moving beyond their conventional association with art and collectibles, this paper presents a novel approach that utilizes NFTs as dynamic carriers for sensitive information. Our solution leverages the immutable NFT data to serve as a secure data pointer, while the mutable NFT data holds sensitive information protected by steganography. Steganography embeds the data within the NFT, making them invisible to unauthorized eyes, while facilitating portability. This dual approach ensures both data integrity and authorized access, even in the face of evolving digital threats. A performance analysis confirms the approach's effectiveness, demonstrating its reliability, robustness, and resilience against attacks on hidden data. This paves the way for secure data transmission across diverse industries.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Cross-Border Exchange of Clinical Data Using Archetype Concepts Compatible with the International Patient Summary
    Tcharaktchiev, Dimitar
    Krastev, Evgeniy
    Petrossians, Patrick
    Abanos, Simeon
    Kyurkchiev, Hristo
    Kovatchev, Petko
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 552 - 556
  • [42] Forensic genetics: The evolving challenge of DNA cross-border exchange
    Scaffardi, Lucia
    BIOLAW JOURNAL-RIVISTA DI BIODIRITTO, 2021, (01): : 329 - 342
  • [43] Interoperability Standards enabling cross-border Patient Summary Exchange
    Chronaki, Catherine
    Estelrich, Ana
    Cangioli, Giorgio
    Melgara, Marcello
    Kalra, Dipak
    Gonzaga, Zabrina
    Garber, Larry
    Blechman, Elaine
    Ferguson, Jamie
    Kay, Stephen
    E-HEALTH - FOR CONTINUITY OF CARE, 2014, 205 : 256 - 260
  • [44] Stock exchange consolidation and cross-border investment: An empirical assessment
    Giofre, Maela
    JOURNAL OF FINANCIAL STABILITY, 2021, 53
  • [45] Does Information Exchange Affect Cross-border Tax Avoidance? Evidence from the Common Reporting Standard
    Wang, Muhan
    Zhang, Kezhong
    Gao, Sihan
    CHINA & WORLD ECONOMY, 2024, 32 (04) : 179 - 228
  • [46] The Internet, Cross-Border Data Flows and International Trade
    Meltzer, Joshua Paul
    ASIA & THE PACIFIC POLICY STUDIES, 2015, 2 (01): : 90 - 102
  • [47] Contested Spaces of Exchange: Informal Cross-Border Trade on the India-Bangladesh Border
    Brown, Alison
    Chakrabarti, Bhaskar
    Mackie, Peter
    Fuller, Crispian
    Bhattacharya, Rajesh
    Bagchi, Soumyabrato
    Chakrabarti, Debapriya
    FORUM FOR DEVELOPMENT STUDIES, 2024, 51 (01) : 121 - 143
  • [48] Privacy policies, cross-border health data and the GDPR
    Mulder, T.
    Tudorica, M.
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2019, 28 (03) : 261 - 274
  • [49] Weaponizing Cross-Border Data Flows: An Opportunity for NATO?
    Malone, Matt
    2023 15TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT, CYCON, 2023, : 329 - 343