Tayana Morkel, Jan HP Eloff, and Martin S Olivier. An overview of image steganography. In ISSA, volume 1, 2005.
 Eko Hari Rachmawanto, Christy Atika Sari, et al. Secure image steganography algorithm based on dct with otp encryption. Journal of Applied Intelligent System, 2(1):1–11, 2017.
 Said E El-Khamy, Noha O Korany, and Marwa H El-Sherif. A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and rsa encryption. Multimedia Tools and Applications, 76(22):24091–24106, 2017.
 Ramadhan J Mstafa and Khaled M Elleithy. A video steganography algorithm based on kanadelucas-tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications, 75(17):10311–10333, 2016.
 Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. bitcoin. org. URL: https://bitcoin. org/bitcoin. pdf (accessed: 24.02.2020), 2008.
 Seyoung Huh, Sangrae Cho, and Soohyung Kim. Managing iot devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT), pages 464–467. IEEE, 2017.
 Asaph Azaria, Ariel Ekblaw, Thiago Vieira, and Andrew Lippman. Medrec: Using blockchain for medical data access and permission management. In 2016 2nd International Conference on Open and Big Data (OBD), pages 25–30. IEEE, 2016.
 Damiano Di Francesco Maesa, Paolo Mori, and Laura Ricci. Blockchain based access control. In IFIP international conference on distributed applications and interoperable systems, pages 206– 220. Springer, 2017.
 Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, and Nan Zhang. Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95:420–429, 2019.
 Yang Xu, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang, and Cheng Zhang. Towards secure network computing services for lightweight clients using blockchain. Wireless Communications and Mobile Computing, 2018, 2018.
 Patrick McCorry, Siamak F Shahandashti, and Feng Hao. A smart contract for boardroom voting with maximum voter privacy. In International Conference on Financial Cryptography and Data Security, pages 357–375. Springer, 2017.
 Gavin Wood et al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1–32, 2014.
 Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR), 53(3):1–43, 2020.
 Juha Partala. Provably secure covert communication on blockchain. Cryptography, 2(3):18, 2018.
 Mengtian Xu, Hanzhou Wu, Guorui Feng, Xinpeng Zhang, and Feng Ding. Broadcasting steganography in the blockchain. In International Workshop on Digital Watermarking, pages 256–267. Springer, 2019.
 Lejun Zhang, Zhijie Zhang, Weizheng Wang, Rasheed Waqas, Chunhui Zhao, Seokhoon Kim, and Huiling Chen. A covert communication method using special bitcoin addresses generated by vanitygen. Computers, Materials & Continua,
 Mar Gimenez-Aguilar, Jose M De Fuentes, Lorena Gonz´alez-Manzano, and Carmen Camara. Zephyrus: An information hiding mechanism leveraging ethereum data fields. IEEE Access, 9:118553–118570, 2021.
 Arvind Narayanan, Andrew Miller, Steven Goldfeder Joseph Bonneau, and Edward Felten. Bitcoin and cryptocurrency technologies. 2021.
 Fabien AP Petitcolas, Ross J Anderson, and Markus G Kuhn. Information hiding-a survey. Proceedings of the IEEE, 87(7):1062–1078, 1999.
 BTC.com vebsite. https://btc.com, Desember 2020.
 EtherScan vebsite. https://etherscan.io/, February 2022.