Skip to main content
Erschienen in:
Buchtitelbild

2024 | OriginalPaper | Buchkapitel

Image Encryption Scheme Based on New 1D Chaotic System and Blockchain

verfasst von : Yongjin Xian, Ruihe Ma, Pengyu Liu, Linna Zhou

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the increasing need for secure image transmission and storage, researchers have focused on developing advanced encryption algorithms. This article highlights the significance of a newly constructed 1D chaotic system and its application in constructing a secure image encryption algorithm over blockchain. The newly proposed 1D logistic cosine tangent chaotic system consists of the cosine function and tangent function replacing the two variables in the logistic map, respectively, thus improving the dynamics of the new 1D chaotic map. The image encryption scheme constructed based on the newly proposed 1d chaotic system relies on the privilege management function of the blockchain’s smart contract to design the key transfer scheme, which simultaneously achieves the security of the cryptographic algorithm and the reliability of the key transfer. The experimental results provide strong evidence that the proposed cryptographic system ensures robust security. This research provides a novel and effective solution for ensuring the confidentiality and integrity of encrypted images, addressing the growing concerns of image security in the digital era.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, Y., Xiao, X., Yang, L.-X., Xiang, Y., Zhong, S.: Secure and efficient outsourcing of PCA-based face recognition. IEEE Trans. Inform. Forensic Secur. 15, 1683–1695 (2020)CrossRef Zhang, Y., Xiao, X., Yang, L.-X., Xiang, Y., Zhong, S.: Secure and efficient outsourcing of PCA-based face recognition. IEEE Trans. Inform. Forensic Secur. 15, 1683–1695 (2020)CrossRef
2.
Zurück zum Zitat Yu, K., et al.: A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial Internet of Things settings. IEEE Internet Things J. 9, 8154–8167 (2022)CrossRef Yu, K., et al.: A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial Internet of Things settings. IEEE Internet Things J. 9, 8154–8167 (2022)CrossRef
3.
Zurück zum Zitat He, Y., Zhang, C., Wu, B., Yang, Y., Xiao, K., Li, H.: A Cross-chain trusted reputation scheme for a shared charging platform based on blockchain. IEEE Internet Things J. 9, 7989–8000 (2022)CrossRef He, Y., Zhang, C., Wu, B., Yang, Y., Xiao, K., Li, H.: A Cross-chain trusted reputation scheme for a shared charging platform based on blockchain. IEEE Internet Things J. 9, 7989–8000 (2022)CrossRef
4.
Zurück zum Zitat Chuman, T., Sirichotedumrong, W., Kiya, H.: Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans. Inform. Forensic Secur. 14, 1515–1525 (2019)CrossRef Chuman, T., Sirichotedumrong, W., Kiya, H.: Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans. Inform. Forensic Secur. 14, 1515–1525 (2019)CrossRef
5.
Zurück zum Zitat Feixiang, Z., Mingzhe, L., Kun, W., Hong, Z.: Color image encryption via Hénon-zigzag map and chaotic restricted Boltzmann machine over blockchain. Opt. Laser Technol. 135, 106610 (2021)CrossRef Feixiang, Z., Mingzhe, L., Kun, W., Hong, Z.: Color image encryption via Hénon-zigzag map and chaotic restricted Boltzmann machine over blockchain. Opt. Laser Technol. 135, 106610 (2021)CrossRef
6.
Zurück zum Zitat Chan, J.C.L., Lee, T.H., Tan, C.P.: Secure communication through a chaotic system and a sliding-mode observer. IEEE Trans. Syst. Man Cybern. Syst. 52, 1869–1881 (2022)CrossRef Chan, J.C.L., Lee, T.H., Tan, C.P.: Secure communication through a chaotic system and a sliding-mode observer. IEEE Trans. Syst. Man Cybern. Syst. 52, 1869–1881 (2022)CrossRef
7.
Zurück zum Zitat Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., Cao, Y.: A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108, 613–636 (2022)CrossRef Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., Cao, Y.: A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108, 613–636 (2022)CrossRef
8.
Zurück zum Zitat Xian, Y., Wang, X., Wang, X., Li, Q., Yan, X.: Spiral-transform-based fractal sorting matrix for chaotic image encryption. IEEE Trans. Circ. Syst. I(69), 3320–3327 (2022) Xian, Y., Wang, X., Wang, X., Li, Q., Yan, X.: Spiral-transform-based fractal sorting matrix for chaotic image encryption. IEEE Trans. Circ. Syst. I(69), 3320–3327 (2022)
9.
Zurück zum Zitat Xian, Y., Wang, X., Teng, L.: Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans. Circ. Syst. Video Technol. 32, 4028–4037 (2022)CrossRef Xian, Y., Wang, X., Teng, L.: Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans. Circ. Syst. Video Technol. 32, 4028–4037 (2022)CrossRef
10.
Zurück zum Zitat Panwar, K., Purwar, R.K., Srivastava, G.: A fast encryption scheme suitable for video surveillance applications using SHA-256 hash function and 1D sine-sine chaotic map. Int. J. Image Graph. 21, 2150022 (2021)CrossRef Panwar, K., Purwar, R.K., Srivastava, G.: A fast encryption scheme suitable for video surveillance applications using SHA-256 hash function and 1D sine-sine chaotic map. Int. J. Image Graph. 21, 2150022 (2021)CrossRef
11.
Zurück zum Zitat Daoui, A., Yamni, M., Chelloug, S.A., Wani, M.A., El-Latif, A.A.A.: Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing. Mathematics 11, 1589 (2023)CrossRef Daoui, A., Yamni, M., Chelloug, S.A., Wani, M.A., El-Latif, A.A.A.: Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing. Mathematics 11, 1589 (2023)CrossRef
12.
Zurück zum Zitat Hua, Z., Chen, Y., Bao, H., Zhou, Y.: Two-dimensional parametric polynomial chaotic system. IEEE Trans. Syst. Man Cybern. Syst. 52, 4402–4414 (2022)CrossRef Hua, Z., Chen, Y., Bao, H., Zhou, Y.: Two-dimensional parametric polynomial chaotic system. IEEE Trans. Syst. Man Cybern. Syst. 52, 4402–4414 (2022)CrossRef
13.
Zurück zum Zitat Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)CrossRef Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)CrossRef
14.
Zurück zum Zitat Afendee Mohamed, M., et al.: A speech cryptosystem using the new chaotic system with a capsule-shaped equilibrium curve. Comput. Mater. Continua 75, 5987–6006 (2023)CrossRef Afendee Mohamed, M., et al.: A speech cryptosystem using the new chaotic system with a capsule-shaped equilibrium curve. Comput. Mater. Continua 75, 5987–6006 (2023)CrossRef
15.
Zurück zum Zitat Jing-yu, S., Hong, C., Gang, W., Zi-bo, G., Zhang, H.: FPGA image encryption-steganography using a novel chaotic system with line equilibria. Digit. Sig. Process. 134, 103889 (2023)CrossRef Jing-yu, S., Hong, C., Gang, W., Zi-bo, G., Zhang, H.: FPGA image encryption-steganography using a novel chaotic system with line equilibria. Digit. Sig. Process. 134, 103889 (2023)CrossRef
16.
Zurück zum Zitat Xian, Y., Wang, X., Teng, L., Yan, X., Li, Q., Wang, X.: Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. Inf. Sci. 596, 304–320 (2022)CrossRef Xian, Y., Wang, X., Teng, L., Yan, X., Li, Q., Wang, X.: Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. Inf. Sci. 596, 304–320 (2022)CrossRef
17.
Zurück zum Zitat Zhu, S., Deng, X., Zhang, W., Zhu, C.: A new one-dimensional compound chaotic system and its application in high-speed image encryption. Appl. Sci. 11, 11206 (2021)CrossRef Zhu, S., Deng, X., Zhang, W., Zhu, C.: A new one-dimensional compound chaotic system and its application in high-speed image encryption. Appl. Sci. 11, 11206 (2021)CrossRef
18.
Zurück zum Zitat Meng, X., Li, J., Di, X., Sheng, Y., Jiang, D.: An encryption algorithm for region of interest in medical DICOM based on one-dimensional eλ-cos-cot map. Entropy 24, 901 (2022)MathSciNetCrossRef Meng, X., Li, J., Di, X., Sheng, Y., Jiang, D.: An encryption algorithm for region of interest in medical DICOM based on one-dimensional eλ-cos-cot map. Entropy 24, 901 (2022)MathSciNetCrossRef
19.
Zurück zum Zitat Hu, Y., Wang, X., Zhang, L.: 1D Sine-Map-Coupling-Logistic-Map for 3D model encryption. Front. Phys. 10, 1006324 (2022)CrossRef Hu, Y., Wang, X., Zhang, L.: 1D Sine-Map-Coupling-Logistic-Map for 3D model encryption. Front. Phys. 10, 1006324 (2022)CrossRef
20.
Zurück zum Zitat Kafetzis, I., Moysis, L., Tutueva, A., Butusov, D., Nistazakis, H., Volos, C.: A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation. Multimedia Tools Appl. 82, 9303–9322 (2023)CrossRef Kafetzis, I., Moysis, L., Tutueva, A., Butusov, D., Nistazakis, H., Volos, C.: A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation. Multimedia Tools Appl. 82, 9303–9322 (2023)CrossRef
21.
Zurück zum Zitat Midoun, M.A., Wang, X., Talhaoui, M.Z.: A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng. 139, 106485 (2021)CrossRef Midoun, M.A., Wang, X., Talhaoui, M.Z.: A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng. 139, 106485 (2021)CrossRef
22.
Zurück zum Zitat Wang, X., Du, X.: Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solitons Fractals 155, 111629 (2022)MathSciNetCrossRef Wang, X., Du, X.: Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solitons Fractals 155, 111629 (2022)MathSciNetCrossRef
23.
Zurück zum Zitat Wang, X., Guan, N., Liu, P.: A selective image encryption algorithm based on a chaotic model using modular sine arithmetic. Optik 258, 168955 (2022)CrossRef Wang, X., Guan, N., Liu, P.: A selective image encryption algorithm based on a chaotic model using modular sine arithmetic. Optik 258, 168955 (2022)CrossRef
24.
Zurück zum Zitat Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)MathSciNetCrossRef Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)MathSciNetCrossRef
25.
Zurück zum Zitat Cao, W., Mao, Y., Zhou, Y.: Designing a 2D infinite collapse map for image encryption. Sig. Process. 171, 107457 (2020)CrossRef Cao, W., Mao, Y., Zhou, Y.: Designing a 2D infinite collapse map for image encryption. Sig. Process. 171, 107457 (2020)CrossRef
26.
Zurück zum Zitat Hua, Z., Jin, F., Xu, B., Huang, H.: 2D Logistic-Sine-coupling map for image encryption. Sig. Process. 149, 148–161 (2018)CrossRef Hua, Z., Jin, F., Xu, B., Huang, H.: 2D Logistic-Sine-coupling map for image encryption. Sig. Process. 149, 148–161 (2018)CrossRef
27.
Zurück zum Zitat Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 450, 361–377 (2018)MathSciNetCrossRef Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 450, 361–377 (2018)MathSciNetCrossRef
28.
Zurück zum Zitat Himeur, Y., Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools Appl. 77, 8603–8627 (2018)CrossRef Himeur, Y., Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools Appl. 77, 8603–8627 (2018)CrossRef
Metadaten
Titel
Image Encryption Scheme Based on New 1D Chaotic System and Blockchain
verfasst von
Yongjin Xian
Ruihe Ma
Pengyu Liu
Linna Zhou
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_1

Premium Partner