2nd International Conference on Materials Science and Sustainable Manufacturing Technology
Encrypted Image Retrieval Scheme on Blockchain
Niranjani V, Chandiya C, Dhanushya D, Harithaa G, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.
Blockchainhas flourished in a variety of industries throughout a period known as the "digital economy",
including finance and digital copyright. Blockchain is highlighting the storage issue more and more. In order to lessen the
demand for node storage, the existing blockchain maintains block information in external storage devices. Blockchain
transaction retrieval issue is brought on by the new blockchain storage approach. The issue arises when the user is required
to download the decentralized blockchain ledger information from the external storage system. Since, they couldn't locate
the node comprising that particular transaction, therefore which results in significant communication overhead. We take
advantage of the data that is Blockchain is semi-structured for this issue and obtain the common traits of blockchain
transactions like the Date and account address. Next, we create a method for retrieving blockchain transactions. Because of
the absence of an effective account-specific secondary search data structure addresses, we suggest the scalable B+ tree. For
encryption and decryption of Images we have used Elliptic curve Cryptography algorithm and AES algorithm. For
Generating Hash value we have used ECDSA Algorithm.
Keywords
Security; Compression, Transmission,Image Encryption and Decryption, Capacity,Decentralization, Smart
Contract, Ledger, Tamper-Proof, Proof of Stack.
P. W. Khan and Y. Byun, “A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things,” Entropy, vol. 22, no. 2, p. 175, Feb. 2020, doi: 10.3390/e22020175.
X. Li, J. Li, F. Yu, X. Fu, J. Yang, and Y. Chen, “BEIR:A Blockchain-based Encrypted Image Retrieval Scheme,” 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), May 2021, doi:10.1109/cscwd49262.2021.9437677.
H. R. Pawar and D. G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryption,” 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), Aug. 2018, doi: 10.1109/rice.2018.8509035.
R. Liu, “Chaos-based fingerprint images encryption using symmetric cryptography,” 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, May 2012, doi: 10.1109/fskd.2012.6234120.
R. Das, S. Manna, and S. Dutta, “Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme,” 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Sep. 2017, doi: 10.1109/icpcsi.2017.8391813.
H. Pan, Y. Lei, and C. Jian, “Research on digital image encryption algorithm based on double logistic chaotic map,” EURASIP Journal on Image and Video Processing, vol. 2018, no. 1, Dec. 2018, doi: 10.1186/s13640-018-0386-3.
T. T. Zhang, S. J. Yan, C. Yan Gu, R. Ren, and K. X. Liao, “Research on Image Encryption Based on DNA Sequence and Chaos Theory,” Journal of Physics: Conference Series, vol. 1004, p. 012023, Apr. 2018, doi: 10.1088/1742-6596/1004/1/012023.
Z. Lei, L. Li, and G. Xianwei, “Design and realization of image encryption system based on SMS4 commercial cipher algorithm,” 2011 4th International Congress on Image and Signal Processing, Oct. 2011, doi: 10.1109/cisp.2011.6100292.
Q. Zhang and Q. Ding, “Digital Image Encryption Based on Advanced Encryption Standard (AES),” 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), Sep. 2015, doi: 10.1109/imccc.2015.261.
W. Wen, Y. Zhang, Y. Fang, and Z. Fang, “A novel selective image encryption method based on saliency detection,” 2016 Visual Communications and Image Processing (VCIP), Nov. 2016, doi: 10.1109/vcip.2016.7805456.
P. Nayak, S. K. Nayak, and S. Das, “A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard,” 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Sep. 2018, doi: 10.1109/icacci.2018.8554728.
A. Nag et al., “Image encryption using affine transform and XOR operation,” 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, Jul. 2011, doi: 10.1109/icsccn.2011.6024565.
J. K. Saini and H. K. Verma, “A hybrid approach for image security by combining encryption and steganography,” 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), Dec. 2013, doi: 10.1109/iciip.2013.6707665.
S. S. H. Shah and G. Raja, “FPGA implementation of chaotic based AES image encryption algorithm,” 2015 IEEE International Con ference on Signal and Image Processing Applications (ICSIPA), Oct. 2015, doi: 10.1109/icsipa.2015.7412256.
K. Sreelakshmi and R. V. Ravi, “An Encryption-then-Compression Scheme Using Autoencoder Based Image Compression for Color Images,” 2020 7th International Conference on Smart Structures and Systems (ICSSS), Jul. 2020, doi: 10.1109/icsss49621.2020.9201967.
Y. Luo, M. Du, and D. Liu, “JPEG Image Encryption Algorithm Based on Spatiotemporal Chaos,” 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Oct. 2012, doi: 10.1109/iwcfta.2012.49.
T. S. Ali and R. Ali, “A novel color image encryption scheme based on a new dynamic compound chaotic map and S -box,” Multimedia Tools and Applications, vol. 81, no. 15, pp. 20585–20609, Mar. 2022, doi: 10.1007/s11042-022-12268-6.
S. Murugan and Anandakumar H., “Privacy Information Leakage Prevention in Cognitive Social Mining Applications,” Cognitive So cial Mining Applications in Data Analytics and Forensics, pp. 188–212, 2019, doi: 10.4018/978-1-5225-7522-1.ch010.
M. Gabr, W. Alexan, K. Moussa, B. Maged, and A. Mezar, “Multi-Stage RGB Image Encryption,” 2022 International Telecommunications Conference (ITC-Egypt), Jul. 2022, doi: 10.1109/itc-egypt55520.2022.9855767.
K. B. Sarmila and S. V. Manisekaran, “A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing,” 2019 International Carnahan Conference on Security Technology (ICCST), Oct. 2019, doi:10.1109/ccst.2019.8888414.
Cite this article
Niranjani V, Chandiya C, Dhanushya D, Harithaa G, “Encrypted Image Retrieval Scheme on Blockchain”, Advances in Computational Intelligence in Materials Science, pp. 036-043, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_7