#

Advances in Computational Intelligence in Materials Science

Book Series

About the Book
About the Author
Table of Contents

Buy this Book

eBook
  • • Included format: Online and PDF
  • • eBooks can be used on all reading devices
  • • ISSN : 2960-2408
  • • ISBN : 978-9914-9946-9-8


Hand Cover
  • • Including format: Hardcover
  • • Shipping Available for individuals worldwide
  • • ISSN : 2960-2394
  • • ISBN : 978-9914-9946-8-1


Services for the Book

Download Product Flyer
Download High-Resolutions Cover

2nd International Conference on Materials Science and Sustainable Manufacturing Technology

Encrypted Image Retrieval Scheme on Blockchain

Niranjani V, Chandiya C, Dhanushya D, Harithaa G, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.


Online First : 07 June 2023
Publisher Name : AnaPub Publications, Kenya.
ISBN (Online) : 978-9914-9946-9-8
ISBN (Print) : 978-9914-9946-8-1
Pages : 036-043

Abstract


Blockchainhas flourished in a variety of industries throughout a period known as the "digital economy", including finance and digital copyright. Blockchain is highlighting the storage issue more and more. In order to lessen the demand for node storage, the existing blockchain maintains block information in external storage devices. Blockchain transaction retrieval issue is brought on by the new blockchain storage approach. The issue arises when the user is required to download the decentralized blockchain ledger information from the external storage system. Since, they couldn't locate the node comprising that particular transaction, therefore which results in significant communication overhead. We take advantage of the data that is Blockchain is semi-structured for this issue and obtain the common traits of blockchain transactions like the Date and account address. Next, we create a method for retrieving blockchain transactions. Because of the absence of an effective account-specific secondary search data structure addresses, we suggest the scalable B+ tree. For encryption and decryption of Images we have used Elliptic curve Cryptography algorithm and AES algorithm. For Generating Hash value we have used ECDSA Algorithm.

Keywords


Security; Compression, Transmission,Image Encryption and Decryption, Capacity,Decentralization, Smart Contract, Ledger, Tamper-Proof, Proof of Stack.

  1. P. W. Khan and Y. Byun, “A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things,” Entropy, vol. 22, no. 2, p. 175, Feb. 2020, doi: 10.3390/e22020175.
  2. X. Li, J. Li, F. Yu, X. Fu, J. Yang, and Y. Chen, “BEIR:A Blockchain-based Encrypted Image Retrieval Scheme,” 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), May 2021, doi:10.1109/cscwd49262.2021.9437677.
  3. H. R. Pawar and D. G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryption,” 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), Aug. 2018, doi: 10.1109/rice.2018.8509035.
  4. R. Liu, “Chaos-based fingerprint images encryption using symmetric cryptography,” 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, May 2012, doi: 10.1109/fskd.2012.6234120.
  5. R. Das, S. Manna, and S. Dutta, “Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme,” 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Sep. 2017, doi: 10.1109/icpcsi.2017.8391813.
  6. H. Pan, Y. Lei, and C. Jian, “Research on digital image encryption algorithm based on double logistic chaotic map,” EURASIP Journal on Image and Video Processing, vol. 2018, no. 1, Dec. 2018, doi: 10.1186/s13640-018-0386-3.
  7. T. T. Zhang, S. J. Yan, C. Yan Gu, R. Ren, and K. X. Liao, “Research on Image Encryption Based on DNA Sequence and Chaos Theory,” Journal of Physics: Conference Series, vol. 1004, p. 012023, Apr. 2018, doi: 10.1088/1742-6596/1004/1/012023.
  8. Z. Lei, L. Li, and G. Xianwei, “Design and realization of image encryption system based on SMS4 commercial cipher algorithm,” 2011 4th International Congress on Image and Signal Processing, Oct. 2011, doi: 10.1109/cisp.2011.6100292.
  9. Q. Zhang and Q. Ding, “Digital Image Encryption Based on Advanced Encryption Standard (AES),” 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), Sep. 2015, doi: 10.1109/imccc.2015.261.
  10. W. Wen, Y. Zhang, Y. Fang, and Z. Fang, “A novel selective image encryption method based on saliency detection,” 2016 Visual Communications and Image Processing (VCIP), Nov. 2016, doi: 10.1109/vcip.2016.7805456.
  11. P. Nayak, S. K. Nayak, and S. Das, “A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard,” 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Sep. 2018, doi: 10.1109/icacci.2018.8554728.
  12. A. Nag et al., “Image encryption using affine transform and XOR operation,” 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, Jul. 2011, doi: 10.1109/icsccn.2011.6024565.
  13. J. K. Saini and H. K. Verma, “A hybrid approach for image security by combining encryption and steganography,” 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), Dec. 2013, doi: 10.1109/iciip.2013.6707665.
  14. S. S. H. Shah and G. Raja, “FPGA implementation of chaotic based AES image encryption algorithm,” 2015 IEEE International Con ference on Signal and Image Processing Applications (ICSIPA), Oct. 2015, doi: 10.1109/icsipa.2015.7412256.
  15. K. Sreelakshmi and R. V. Ravi, “An Encryption-then-Compression Scheme Using Autoencoder Based Image Compression for Color Images,” 2020 7th International Conference on Smart Structures and Systems (ICSSS), Jul. 2020, doi: 10.1109/icsss49621.2020.9201967.
  16. Y. Luo, M. Du, and D. Liu, “JPEG Image Encryption Algorithm Based on Spatiotemporal Chaos,” 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, Oct. 2012, doi: 10.1109/iwcfta.2012.49.
  17. T. S. Ali and R. Ali, “A novel color image encryption scheme based on a new dynamic compound chaotic map and S -box,” Multimedia Tools and Applications, vol. 81, no. 15, pp. 20585–20609, Mar. 2022, doi: 10.1007/s11042-022-12268-6.
  18. S. Murugan and Anandakumar H., “Privacy Information Leakage Prevention in Cognitive Social Mining Applications,” Cognitive So cial Mining Applications in Data Analytics and Forensics, pp. 188–212, 2019, doi: 10.4018/978-1-5225-7522-1.ch010.
  19. M. Gabr, W. Alexan, K. Moussa, B. Maged, and A. Mezar, “Multi-Stage RGB Image Encryption,” 2022 International Telecommunications Conference (ITC-Egypt), Jul. 2022, doi: 10.1109/itc-egypt55520.2022.9855767.
  20. K. B. Sarmila and S. V. Manisekaran, “A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing,” 2019 International Carnahan Conference on Security Technology (ICCST), Oct. 2019, doi:10.1109/ccst.2019.8888414.

Cite this article


Niranjani V, Chandiya C, Dhanushya D, Harithaa G, “Encrypted Image Retrieval Scheme on Blockchain”, Advances in Computational Intelligence in Materials Science, pp. 036-043, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_7

Copyright


© 2023 Niranjani V, Chandiya C, Dhanushya D, Harithaa G. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.