Skip to Content
You are currently on the new version of our website. Access the old version .
SustainabilitySustainability
  • Article
  • Open Access

14 March 2023

Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments

,
,
,
,
,
,
and
1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Computer Science, Community College, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia
3
Department of Mathematics, Faculty of Sciences and Arts, King Khalid University, Muhayil Asir 61913, Saudi Arabia
4
Department of Computer Science, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt

Abstract

The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital twin concept, provide advanced solutions to create a new virtual world. Due to the ongoing development of information communication technologies and broadcast channels, data security has become a major concern. Blockchain (BC) technology is an open, decentralized, and transparent distributed database that can be maintained by the group. BC’s major features are high credibility, decentralization, transparency, versatility, autonomy, traceability, anonymity, intelligence, reward mechanisms, and irreversibility. This study presents a blockchain-driven image encryption technique using arithmetic optimization with a fractional-order Lorenz system (BDIE-AOFOLS). The BDIE-AOFOLS technique uses the FOLS method, which integrates the Arnold map, tent map, and fractional Lorenz system. Besides this, an arithmetic optimization algorithm (AOA) was carried out for the optimum key generation process to achieve the maximum PSNR value. The design of an AOA-based optimal generation of keys for the FOLS technique determines the novelty of the current work. Moreover, the cryptographical pixel values of the images can be stored securely in the BC, guaranteeing image security. We compared the outcomes of the proposed BDIE-AOFOLS technique against benchmark color images. The comparative analysis demonstrated the improved security efficiency of the BDIE-AOFOLS technique over other approaches, with a mean square error of 0.0430 and a peak signal-to-noise ratio of 61.80 dB.

1. Introduction

With the substantial growth of WiFi and 5G, digital images containing huge amounts of data are transferred frequently over multiple communication networks. In the meantime, tampering with and stealing digital images of high potential values are common [1]. Thus, the security and privacy of such images must be preserved before transmission. Typical digital image protection techniques include image encryption, digital watermarking, secret-sharing, and information hiding. Among these techniques, image encryption is the most direct way [2]. The diffusion and permutation stages are the two main steps of digital image encryption. The permutation stage alters the pixel positions of the original images arbitrarily, while the diffusion stage requires that all pixel values of the original images be altered [3]. The main tools utilized in image encrypting contain frequency domain transformations, Chaos, evolutionary algorithms, neural networks (NNs), and DNA coding [4]. Sensitivity and Chaos’s unpredictability in its primary state make it a widely used tool in image encrypting techniques [5].
Recently, authors have modeled numerous digital image encryption techniques related to NNs [6]. Cyber-attacks on automation on the Internet of Things (IoT) platform have far-reaching impacts. They can disturb manufacturing tasks, causing data loss and harming the quality and the standard of products [7]. Current solutions for image encryption do not assist those smart industries in which the peers are decentralized. There are several prevailing methods of image encryption. However, none of them complies with industrial needs. Smart industrial units are decentralized networks of interconnected IIoT devices that can share sensitive information, which is at risk of exposure [8]. The blockchain (BC) offers comprehensive solutions for decentralized devices, and its secure encrypted architecture is ideal for smart industrial units.
The history of BC technology (BCT) originates from Bitcoin or cryptocurrency. BC can act as a ledger that records every transferable transaction between individuals. This ledger can be decentralized; therefore, there are no centralized authorities [9]. It can be cryptographically immutable and secure. This ledger cannot be changed or deleted once modified. BC is a consensus-related mechanism, which means that all nodes verify the incidence of the transaction and derive a consensus regarding every unit of data before it can be positioned into a BCT-related ledger. BCT solves security issues. Owing to its dynamic properties, businesses quickly understood that BCT had a serious role in the IIoT [10]. This technology is implemented in industrial units to achieve security, regulatory complements, and transparency. BC can markedly transform the IIoT. It grants new functionality via smart contracts, security, and peer-to-peer device communications.
With the increased utilization of virtual reality and augmented reality in several industrial sectors, such as healthcare, education, and entertainment, the requirement of confidentiality in the context of sensitive images has become important. Encryption ensures that only authorized users have access to the images, defending the confidentiality of the data. It also ensures that the images remain unaltered during storage or transmission. This helps to maintain the data integrity of the images and ensures that they are reliable and trustworthy. Therefore, an image encryption technique with BC can be used to accomplish enhanced security.
With this motivation, this study develops blockchain-driven image encryption using arithmetic optimization with a fractional-order Lorenz system (BDIE-AOFOLS). The BDIE-AOFOLS procedure uses the FOLS technique, which is an integration of the Arnold map, tent map, and fractional Lorenz system. In addition, an arithmetic optimization algorithm (AOA) is carried out for the optimum key generation process, with the objective of achieving maximum PSNR value. The design of the AOA-based optimal generation of keys for the FOLS technique determines the novelty of the current work. Moreover, the cryptographical pixel values of the images can be stored securely in BC, guaranteeing image security. The experimental outcome investigation of the BDIE-AOFOLS technique was tested utilizing benchmark color images.

3. The Proposed Model

In this study, we have developed a novel BDIE-AOFOLS system for a color image encryption process. The BDIE-AOFOLS technique mainly relies on the FOLS technique, which is an integration of an Arnold map, tent map, and fractional Lorenz system. In addition, an AOA was executed for an optimum key generation process, with the objective of achieving the maximum PSNR value. Figure 1 represents the workflow of the BDIE-AOFOLS approach.
Figure 1. Workflow of the BDIE-AOFOLS approach.

3.1. Blockchain Technology in the BDIE-AOFOLS Technique

In the presented technique, the cryptographic pixel values of images can be stored on the BC, thereby assuring the privacy and security of images. BC is a beneficial ledger for assuring data quality. It has generated “controlling operations” for numerous decentralized industrial gadgets and has performed peer-to-peer interactions between globally decentralized gadgets. Moreover, BC offers amenability along with authority for all independent systems; simultaneously, it resolves security problems. In industrial fields, a private BC has been used for ensuring security. The phrase “Hyperledger fabric” refers to an environment that hinges on BC and satisfies the necessity for an IIoT platform. This is helpful in numerous fields, such as transportation, healthcare, large-scale IoT data, and the supply chain. Moreover, BC aids in accomplishing decentralization, privacy, and trust. BC also enables simple connections with numerous gadgets.
Figure 2 shows the basic framework of the BC. The client or server computer acts as a node and then commences making the connections.
Figure 2. The structure of a blockchain.
The nodes exchange encrypted data with other peer nodes, without any invader being able to steal the information. They may transfer the information to a central location or distributed gadget, which can be connected to other gadgets. The hashing value specifies every transaction that happened in the block.
The transactions will be integrated together to generate a block, which will be added to the chain next to the confirmation from the endorsed node. The operation starts if the client begins to submit a proposal. The transaction procedures employ two types of peers: committer peers and endorsers. The certificate authority (CA) allows the credentials to the client as is compulsory for user applications for gaining permission to submit novel communications.
To start a novel transaction, the user application transfers the transaction proposals to a peer, thereby updating or reading the ledger. The peer could then read it and validate the authorization policy. Finally, the committer–peer makes an asynchronous announcement that is relevant to the transaction’s rank.

3.2. Image Encryption Using the FOLS Technique

To encrypt the color images, a FOLS technique is used in this work. In this study, a novel color image encryption technique dependent upon a fractional order chaotic system was introduced with the combination of three chaotic systems (a tent map (TM), an Arnold map (AM), and a fractional Lorenz system (FLS)) [21]. Initially, the plain color images are separated into their R ,   B , and G layers. In the scrambling phase, these three layers are scrambled with the AM, among which the first value of initial scrambling is the key, and the first values of the remaining two scrambles are the R and G layers.
The gray value of RGB is molded and is later applied as the initial value of FLS. Following this, add-mode diffusion is performed. Finally, an encrypted image is achieved. The plain image is represented as A , the pixel matrix size was M × N × 3 , and the encryption technique is determined by the following process:
Step 1: Enter the A plain image and the key, K , and assume that the size of A is M × N × 3 . Read the first value and parameter of the AM in K , then apply an AM for scrambling the plain image R layer. Choose the latter 2 pixels of the R layer after scrambling, obtaining the gray value as a parameter of AM while scrambling the G layer, and apply a similar function to scrambling the B layer for obtaining image P 1 .
P 1 = { R G B } = { r ( 1 ) , r ( 2 ) , r ( 3 ) , r ( m ) g ( 1 ) , g ( 2 ) , g ( 3 ) , g ( m ) b ( 1 ) , b ( 2 ) , b ( 3 ) , b ( m ) } m = M I N
Step 2: Read the first value of TM X ( 0 ) from the key, K . The TM is reiterated 800 times; the initial 300 transition conditions are abandoned and take the state value, which is defined by K r .
K ζ = [ x t ( 200 ) , x t ( 300 ) , x t ( 400 ) , x t ( 500 ) ] )
Step 3: Use Equation (3) for turning K ζ into s 1 and s 2 coordinates for placing the pixel in P 1 .
The FLS is reiterated M l V and 2 M N times, respectively, with a small perturbation of the model every 3000 times, to obtain a size of 3 × M l V and 3 × 2 M l V for the novel pseudo-random sequences S 1 and S 2 , which are transmuted by Equation (4) to password K 1 and K 2 .
{ s 1 = ( x t ( 300 ) × 100 f l o o r ( x t ( 300 ) × 100 ) ) × 10 6 m o d   m s 2 = ( x t ( 500 ) × 100 f l o o r ( x t ( 500 ) × 100 ) ) × 10 6 m o d   m    
K o = [ K o 1 K o 2 ] = [ R s 1 , G s B s 1 R s 2 , G s 2 B s 2 ]  
{ K 1 ( j ) = ( f l o o r ( S 1 ( j ) × 2 16 ) m o d 256 ) + 1 K 2 ( j ) = ( f l o o r ( S 2 ( j ) × 2 16 ) m o d 256 ) + 1  
Step 4: Utilize the password, K 1 , to spread the data between the layers of images; this can be computed, as follows:
{ r ( i ) = r ( i ) k 1 ( 1 , i ) b ( i ) g ( i ) = g ( i ) k 1 ( 2 , i ) r , ( i )   b ( i ) = b ( i ) k 1 ( 3 , i ) g ( i ) ,   i = 1 , 2 ,   , M I N  
In Equation (6), r ( i ) ,   g ( i ) , b ( i ) denotes the pixel value after diffusing for the initial time. After pixel diffusion between the layers, the plain data of all the layers are diffused to the other 2 layers. This phase could improve the model’s capability for resisting a chosen-plain attack.

3.3. Optimal Key Generation Using AOA

The aim of key generation is to offer the secure encryption and decryption of data. An optimum key generation process ensures that the keys utilized for encryption and decryption are random, unique, and sufficiently complex, making it hard for attackers to decrypt the data. The system generates the keys rapidly and precisely, with no need for high computation resources. Therefore, in this work, an AOA was executed for the optimal key generation process, with the objective of achieving the maximum PSNR value [22]. AOA operates following the distribution behavior of mathematical operations, such as multiplication (M), division (D), subtraction (S), and addition (A), which aims at finding the optimum solution covering a large number of search spaces.
The AOA operation depends on four major processes—inspiration, initialization, exploration, and exploitation. The steps that are adopted to establish an optimum solution by applying the AOA technique are given below.
Step 1: Inspiration is based on the operation of a simple arithmetical operator to determine better values when subjected to specific conditions from a large number of candidate solutions. The applicability of an arithmetic operator is used to find a solution for the arithmetical problem.
Step 2: Initialization, where the candidate solution can be determined as follows:
Y ( t ) = { y 11 y 1 i y 1 , n 1 y 1 n y 21 y 2 i y 2 , n 1 y 2 n y m 1 , 1 y m 1 , 2 y m 1 , i y m 1 , n 1 y m 1 , n y m 1 y m 2 y m i y m , n 1 y m n } .
We then calculate the math optimizer acceleration ( m o a ) coefficient:
m o a ( I t e r c u r r e n t ) = α min + I t e r c u r r e n t × ( α max α min   I t e r   max   )   .  
In Equation (8), α   max   and α   min   denote the maximal and minimal values of the accelerated function, I t e r c u r r e n t shows the existing iteration, and , I t e r   max   , indicates the maximal iteration.
Step 3: The exploration operators of AOA are the D and M operators. The exploration process recognizes the near-optimum solution that should be attained after various iterations. The D and M operators are used to support the exploitation phase via effective transmission. The higher dispersion possibility does not allow this exploration operator to approach the optimum solution.
In this phase, the division and multiplication search strategies implement the location update and are given by the following equation:
If r 1 > m o a , then
y i j ( I t e r c u r r e n t + 1 ) = { y j B e s t ÷ ( m o p + ε ) × ( ( U B j L B j ) × λ + L B j ) ,   r 2 < 0.5 y i B e s t × ( m o p ) × ( ( U B i L B i ) × λ + L B i ) ,   O t h e r w i s e  
In Equation (9), r 1 and r 2 denote the smaller random integers; the D operator implements when r 2 < 0.5 , while the M operators do not implement until the D operator finishes the existing process. The better solution that has been assessed so far is y j B e s i .   λ ’ characterizes the control parameter for altering the searching process, ε denotes the small number, L B j and U B j indicate the lower and upper bounds of the existing location, and ‘ m o p ’ represents the math optimizer probability shown in the following equation:
m o p ( I t e r c u r r e n t ) = ( 1 I t e r c u r r e n t 1 β I t e r   max   1 β )   .
In Equation (10), β indicates the sensitivity parameter determining the exploration accuracy.
Step 4: Exploitation can be performed by the S and A operators that move through the searching space and attain a more highly dense solution. Owing to a lower dispersion, the above two operators are more effective in approaching the better t solution point than the higher dispersion operators, D and M .
The addition and subtraction search strategies evolve the location of the near-optimum solution by moving through the deep dense region and are updated as follows:
If r 1 < m o a ( I t e r c u r r e n t ) then
y i j ( I t e r c u r r e n t + 1 ) = { y j B e s t ( m o p ) × ( ( U B j L B j ) × λ + L B j ) ,   r 3 < 0.5 y j B e s i + ( m o p ) × ( ( U B j L B j ) × λ + L B j ) ,   O t h e r w i s e  
The S and A operators assist in overcoming the existence of local minima; this exploitation process facilitates the exploration method to accomplish an optimum solution by retaining the diversity of candidate solutions. The hierarchical order of the D ,   M ,   S , and A operators evaluate the location of the near-optimum solution and overcome the optimum stagnation occurrence toward the end of the final iterations. The AOA system was utilized in the initialization of the public as well as secret keys contained in the encryption procedure. This ensures that the method that PSNR obtained is improved. The fitness function of the AOA system for the FOLS approach is provided, as follows:
F i t n e s s   f u n c t i o n = max   { P S N R } .

4. Performance Validation

In this section, the experimental validation of the BDIE-AOFOLS approach was tested utilizing benchmark color images. Figure 3 shows the sample images. In Table 1, the encryption results of the BDIE-AOFOLS technique are clearly depicted. The results indicated that the input image is properly encrypted and reconstructed without any loss of information. It is evident that the BDIE-AOFOLS technique has obtained increasing values of PSNR and CC. At the same time, the BDIE-AOFOLS technique has obtained decreasing values of MSE under all images.
Figure 3. The sample images.
Table 1. Encryption outcome of the BDIE-AOFOLS approach.
Table 2 and Figure 4 illustrate the information entropy values (IEV) outcomes of the BDIE-AOFOLS with the existing models [11]. The results indicated that the BDIE-AOFOLS approach has reached enhanced IEV values under all channels. For the sample, on the R channel, the BDIE-AOFOLS technique has reached a higher IEV of 7.9995, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN models have obtained lower IEV levels of 7.9992, 7.9941, 7.9938, and 7.9931, respectively. Meanwhile, on the G channel, the BDIE-AOFOLS method has reached a higher IEV of 7.9998, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods have gained lower IEV levels of 7.9990, 7.9935, 7.9921, and 7.9922, respectively. Furthermore, on the B channel, the BDIE-AOFOLS approach has reached a higher IEV of 7.9997, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods have attained lower IEV levels of 7.9992, 7.9933, 7.9930, and 7.9915, respectively.
Table 2. IEV analysis of BDIE-AOFOLS approach with existing algorithms.
Figure 4. IEV analysis of the BDIE-AOFOLS system with existing algorithms.
Table 3 reveals a comparative MSE and PSNR inspection of the BDIE-AOFOLS with recent models. A comparative analysis of the BDIE-AOFOLS with existing approaches in terms of MSE is reported in Figure 5. The results represent the improvised outcomes of the BDIE-AOFOLS model using minimal values of MSE. For instance, on IMG-1, the BDIE-AOFOLS technique attains a reduced MSE value of 0.0590, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN models have resulted in improved MSE values of 0.0636, 0.1850, 0.2875, and 1.5733, respectively.
Table 3. Comparative analysis of BDIE-AOFOLS system with the existing algorithms, under varying test images.
Figure 5. MSE analysis of the BDIE-AOFOLS approach with various test images.
Along with these findings, for IMG-3, the BDIE-AOFOLS method achieved a reduced MSE of 0.0430, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods resulted in increased MSE values of 0.0487, 0.2027, 0.2352, and 2.2278, respectively. Finally, for IMG-5, the BDIE-AOFOLS algorithm attained a reduced MSE of 0.1100, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN approaches resulted in increased MSE values of 0.1117, 0.1798, 0.2318, and 2.5501, respectively.
In Figure 6, a comprehensive PSNR analysis of the BDIE-AOFOLS with recent algorithms is reported. The obtained values show the superior performance of the BDIE-AOFOLS technique, with improved PSNR values. For instance, for IMG-1, the BDIE-AOFOLS technique accomplished an enhanced PSNR value of 60.42 dB, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN models obtained decreased PSNR values of 60.10 dB, 55.46 dB, 53.54 dB, and 46.16 dB, respectively. Meanwhile, for IMG-3, the BDIE-AOFOLS method accomplished an enhanced PSNR value of 61.80 dB, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods achieved decreased PSNR values of 61.26 dB, 55.06 dB, 54.42 dB, and 44.65 dB, respectively. Eventually, for IMG-5, the BDIE-AOFOLS technique achieved an enhanced PSNR value of 57.72 dB, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods attained decreased PSNR values of 57.65 dB, 55.58 dB, 54.48 dB, and 44.07 dB, respectively.
Figure 6. PSNR analysis of the BDIE-AOFOLS approach with various test images.
In Table 4 and Figure 7, a detailed CC comparison of the BDIE-AOFOLS approach with recent methods is given. The obtained values show the superior performance of the BDIE-AOFOLS method, with improved CC values. For example, for IMG-1, the BDIE-AOFOLS technique accomplished an enhanced CC value of 99.68%, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods obtained decreased CC values of 99.60%, 99.40%, 99.30%, and 98.90%, respectively. Meanwhile, for IMG-3, the BDIE-AOFOLS approach achieved an enhanced CC value of 99.72%, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods showed decreased CC values of 99.58%, 99.46%, 99.35%, and 99.21%, accordingly. Eventually, for IMG-5, the BDIE-AOFOLS method accomplished an enhanced CC value of 99.93%, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods obtained decreased CC values of 99.90%, 99.70%, 99.10%, and 98.80%, respectively.
Table 4. CC analysis of the BDIE-AOFOLS approach with the existing algorithms, with various test images.
Figure 7. CC analysis of the BDIE-AOFOLS approach, with the various test images.
A comparative analysis of the BDIE-AOFOLS with existing methods in terms of CT is reported in Table 5 and Figure 8. The results represent the improvised outcomes of the BDIE-AOFOLS approach, with minimal values of MSE. For example, for IMG-1, the BDIE-AOFOLS method reached a reduced CT value of 1.164 s, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods resulted in increased CT values of 1.192 s, 1.619 s, 2.117 s, and 2.837 s, respectively. In addition, for IMG-3, the BDIE-AOFOLS method attained a reduced CT value of 1.528 s, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods resulted in increased CT values of 1.549 s, 1.774 s, 1.910 s, and 2.718 s, respectively.
Table 5. CT analysis of the BDIE-AOFOLS system with the existing algorithms, using the various test images.
Figure 8. CT analysis of the BDIE-AOFOLS approach, using the various test images.
Finally, for IMG-5, the BDIE-AOFOLS method attains a reduced CT value of 1.190 s, while the SSOHCNN, WOAHCNN, GWOHCNN, and HCNN methods have resulted in increased CT values of 1.214 s, 1.736 s, 1.973 s, and 2.161 s, respectively. These results emphasized the improvement offered by the suggested technique over other existing models. The proposed image encryption with BC offers several benefits, including enhanced security, transparency, and tamper-proof storage. It is particularly useful for protecting sensitive images in virtual environments where the confidentiality and integrity of data are critical.

5. Conclusions

In this study, we have developed a new BDIE-AOFOLS technique for color image encryption processing. The BDIE-AOFOLS technique secures the images using three major processes, namely, BC technology, image encryption, and optimal key generation. At the initial stage, the FOLS technique was employed for the encryption of the images. Next, AOA was conducted to complete the optimum key generation process, with the objective of achieving the maximum PSNR value. Finally, BC was used to securely store the cryptographical pixel values of the images and thereby guarantee image security. The experimental outcome investigation of the BDIE-AOFOLS technique demonstrated the promising performance of the BDIE-AOFOLS technique over other approaches, with a mean square error of 0.0430 and a peak signal-to-noise ratio of 61.80 dB. In the future, the optimal key generation process can be employed to explore the use of quantum key generation algorithms and technologies to provide even more secure and efficient key generation processes.

Author Contributions

Conceptualization, M.A.A.; Methodology, M.A.; Software, M.O. and A.A.A.; Validation, M.A., F.A.-M., M.O., A.M., M.I.A. and A.A.A.; Formal analysis, F.A.-M.; Investigation, F.A.-M.; Resources, M.O.; Data curation, A.A.A.; Writing—original draft, M.A.A., M.A., A.M., M.I.A. and A.E.O.; Writing—review & editing, M.A., F.A.-M., M.O., A.M., M.I.A., A.A.A. and A.E.O.; Visualization, F.A.-M.; Supervision, M.A.A.; Project administration, A.M.; Funding acquisition, M.A.A., F.A.-M. and A.M. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Group Project under grant number (35/44). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R330), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. Research Supporting Project number (RSP2023R459), King Saud University, Riyadh, Saudi Arabia. This study is supported via funding from Prince Sattam bin Abdulaziz University project number (PSAU/2023/R/1444).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written via the contributions of all authors. All authors have given approval for the final version of the manuscript.

References

  1. Pustokhina, I.V.; Pustokhin, D.A.; Shankar, K. Blockchain-Based Secure Data Sharing Scheme Using Image Steganography and Encryption Techniques for Telemedicine Applications. In Wearable Telemedicine Technology for the Healthcare Industry; Academic Press: Cambridge, MA, USA, 2022; pp. 97–108. [Google Scholar]
  2. Acharya, M.; Sharma, R.S. A Novel Image Encryption Based on Feedback Carry Shift Register and Blockchain for Secure Communication. Int. J. Appl. Eng. Res. 2021, 16, 466–477. [Google Scholar]
  3. Khan, A.A.; Laghari, A.A.; Gadekallu, T.R.; Shaikh, Z.A.; Javed, A.R.; Rashid, M.; Estrela, V.V.; Mikhaylov, A. A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment. Comput. Electr. Eng. 2022, 102, 108234. [Google Scholar] [CrossRef]
  4. Shankar, K.; Elhoseny, M.; Perumal, E.; Ilayaraja, M.; Sathesh Kumar, K. An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization. In Cybersecurity and Secure Information Systems; Springer: Cham, Switzerland, 2019; pp. 31–42. [Google Scholar]
  5. Subathra, G.; Antonidoss, A. A Multiobjective Based Encryption Scheme for Content-Based Addressing in Blockchain. In Proceedings of the 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2–4 December 2021; pp. 702–709. [Google Scholar]
  6. Banik, A.; Laiphrakpam, D.S.; Agrawal, A.; Patgiri, R. Secret image encryption based on chaotic system and elliptic curve cryptography. Digit. Signal Process. 2022, 129, 103639. [Google Scholar] [CrossRef]
  7. Singh, K.N.; Singh, A.K. Towards integrating image encryption with compression: A survey. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2022, 18, 1–21. [Google Scholar] [CrossRef]
  8. efa Tunçer, S.; Karakuzu, C. Performance Analysis of Chaotic Neural Network and Chaotic Cat Map Based Image Encryption. J. Comput. Inf. Sci. 2022, 5, 37. [Google Scholar] [CrossRef]
  9. Chen, Y.; Chen, H.; Han, M.; Liu, B.; Chen, Q.; Ma, Z.; Wang, Z. Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain network. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 146. [Google Scholar] [CrossRef]
  10. Khan, P.W.; Byun, Y. A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy 2020, 22, 175. [Google Scholar] [CrossRef] [PubMed]
  11. Khayyat, M.M.; Khayyat, M.M.; Abdel-Khalek, S.; Mansour, R.F. Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment. Alex. Eng. J. 2022, 61, 11377–11389. [Google Scholar] [CrossRef]
  12. Neelakandan, S.; Beulah, J.R.; Prathiba, L.; Murthy, G.L.N.; Irudaya Raj, E.F.; Arulkumar, N. Blockchain with deep learning-enabled secure healthcare data transmission and diagnostic model. Int. J. Model. Simul. Sci. Comput. 2022, 13, 2241006. [Google Scholar] [CrossRef]
  13. Li, R. Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed. Tools Appl. 2021, 80, 30583–30603. [Google Scholar] [CrossRef]
  14. Bhaskaran, R.; Karuppathal, R.; Karthick, M.; Vijayalakshmi, J.; Kadry, S.; Nam, Y. Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT. Intell. Autom. Soft Comput. 2022, 33, 1593–1606. [Google Scholar] [CrossRef]
  15. Padmavathi, U.; Rajagopalan, N. Blockchain enabled emperor penguin optimizer based encryption technique for secure image management system. Wirel. Pers. Commun. 2022, 127, 2347–2364. [Google Scholar] [CrossRef]
  16. Sammeta, N.; Parthiban, L. Data Ownership and Secure Medical Data Transmission using Optimal Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain. Int. J. Image Graph. 2021, 2240003. [Google Scholar] [CrossRef]
  17. Mahesh Kumar, M.; Prasad, M.V.; Raju, U.S.N. BMIAE: Blockchain-based multi-instance iris authentication using additive ElGamal homomorphic encryption. IET Biom. 2020, 9, 165–177. [Google Scholar] [CrossRef]
  18. Karim, A. Development of secure Internet of Vehicle Things (IoVT) for smart transportation system. Comput. Electr. Eng. 2022, 102, 108101. [Google Scholar] [CrossRef]
  19. He, H.; Yuan, Y.; Ye, Y.; Tai, H.M.; Chen, F. Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency. J. Vis. Commun. Image Represent. 2023, 90, 103733. [Google Scholar] [CrossRef]
  20. Sabir, S.; Guleria, V. Multi-layer security based multiple image encryption technique. Comput. Electr. Eng. 2023, 106, 108609. [Google Scholar] [CrossRef]
  21. Chen, J.; Li, C.; Yang, X. Chaos synchronization of the distributed-order Lorenz system via active control and applications in chaotic masking. Int. J. Bifurc. Chaos 2018, 28, 1850121. [Google Scholar] [CrossRef]
  22. Zheng, R.; Jia, H.; Abualigah, L.; Liu, Q.; Wang, S. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization. Processes 2021, 9, 1774. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.