Research Article

Covert Communication Scheme Based on Bitcoin Transaction Mechanism

Table 8

Embedding mechanism.

SchemeCarrierCapacity (single transaction)Concealment

Amount field [17]Amount field16 bitsWeak
BLOOCE [18]Least significant bit of address1 bitStrong
Kleptography [21]OP_RETURN80 bytesWeak
V-BLOOCE [22]The last character of the addresslog258 bitsStrong
BLOOCE+ [23]The last α bits of the addressα bitsStrong
OursPublic key hash120 bitsStrong