Skip to main content

Image Encryption Scheme Based on New 1D Chaotic System and Blockchain

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2023)

Abstract

With the increasing need for secure image transmission and storage, researchers have focused on developing advanced encryption algorithms. This article highlights the significance of a newly constructed 1D chaotic system and its application in constructing a secure image encryption algorithm over blockchain. The newly proposed 1D logistic cosine tangent chaotic system consists of the cosine function and tangent function replacing the two variables in the logistic map, respectively, thus improving the dynamics of the new 1D chaotic map. The image encryption scheme constructed based on the newly proposed 1d chaotic system relies on the privilege management function of the blockchain’s smart contract to design the key transfer scheme, which simultaneously achieves the security of the cryptographic algorithm and the reliability of the key transfer. The experimental results provide strong evidence that the proposed cryptographic system ensures robust security. This research provides a novel and effective solution for ensuring the confidentiality and integrity of encrypted images, addressing the growing concerns of image security in the digital era.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, Y., Xiao, X., Yang, L.-X., Xiang, Y., Zhong, S.: Secure and efficient outsourcing of PCA-based face recognition. IEEE Trans. Inform. Forensic Secur. 15, 1683–1695 (2020)

    Article  Google Scholar 

  2. Yu, K., et al.: A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial Internet of Things settings. IEEE Internet Things J. 9, 8154–8167 (2022)

    Article  Google Scholar 

  3. He, Y., Zhang, C., Wu, B., Yang, Y., Xiao, K., Li, H.: A Cross-chain trusted reputation scheme for a shared charging platform based on blockchain. IEEE Internet Things J. 9, 7989–8000 (2022)

    Article  Google Scholar 

  4. Chuman, T., Sirichotedumrong, W., Kiya, H.: Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans. Inform. Forensic Secur. 14, 1515–1525 (2019)

    Article  Google Scholar 

  5. Feixiang, Z., Mingzhe, L., Kun, W., Hong, Z.: Color image encryption via Hénon-zigzag map and chaotic restricted Boltzmann machine over blockchain. Opt. Laser Technol. 135, 106610 (2021)

    Article  Google Scholar 

  6. Chan, J.C.L., Lee, T.H., Tan, C.P.: Secure communication through a chaotic system and a sliding-mode observer. IEEE Trans. Syst. Man Cybern. Syst. 52, 1869–1881 (2022)

    Article  Google Scholar 

  7. Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., Cao, Y.: A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108, 613–636 (2022)

    Article  Google Scholar 

  8. Xian, Y., Wang, X., Wang, X., Li, Q., Yan, X.: Spiral-transform-based fractal sorting matrix for chaotic image encryption. IEEE Trans. Circ. Syst. I(69), 3320–3327 (2022)

    Google Scholar 

  9. Xian, Y., Wang, X., Teng, L.: Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans. Circ. Syst. Video Technol. 32, 4028–4037 (2022)

    Article  Google Scholar 

  10. Panwar, K., Purwar, R.K., Srivastava, G.: A fast encryption scheme suitable for video surveillance applications using SHA-256 hash function and 1D sine-sine chaotic map. Int. J. Image Graph. 21, 2150022 (2021)

    Article  Google Scholar 

  11. Daoui, A., Yamni, M., Chelloug, S.A., Wani, M.A., El-Latif, A.A.A.: Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing. Mathematics 11, 1589 (2023)

    Article  Google Scholar 

  12. Hua, Z., Chen, Y., Bao, H., Zhou, Y.: Two-dimensional parametric polynomial chaotic system. IEEE Trans. Syst. Man Cybern. Syst. 52, 4402–4414 (2022)

    Article  Google Scholar 

  13. Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  14. Afendee Mohamed, M., et al.: A speech cryptosystem using the new chaotic system with a capsule-shaped equilibrium curve. Comput. Mater. Continua 75, 5987–6006 (2023)

    Article  Google Scholar 

  15. Jing-yu, S., Hong, C., Gang, W., Zi-bo, G., Zhang, H.: FPGA image encryption-steganography using a novel chaotic system with line equilibria. Digit. Sig. Process. 134, 103889 (2023)

    Article  Google Scholar 

  16. Xian, Y., Wang, X., Teng, L., Yan, X., Li, Q., Wang, X.: Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. Inf. Sci. 596, 304–320 (2022)

    Article  Google Scholar 

  17. Zhu, S., Deng, X., Zhang, W., Zhu, C.: A new one-dimensional compound chaotic system and its application in high-speed image encryption. Appl. Sci. 11, 11206 (2021)

    Article  Google Scholar 

  18. Meng, X., Li, J., Di, X., Sheng, Y., Jiang, D.: An encryption algorithm for region of interest in medical DICOM based on one-dimensional eλ-cos-cot map. Entropy 24, 901 (2022)

    Article  MathSciNet  Google Scholar 

  19. Hu, Y., Wang, X., Zhang, L.: 1D Sine-Map-Coupling-Logistic-Map for 3D model encryption. Front. Phys. 10, 1006324 (2022)

    Article  Google Scholar 

  20. Kafetzis, I., Moysis, L., Tutueva, A., Butusov, D., Nistazakis, H., Volos, C.: A 1D coupled hyperbolic tangent chaotic map with delay and its application to password generation. Multimedia Tools Appl. 82, 9303–9322 (2023)

    Article  Google Scholar 

  21. Midoun, M.A., Wang, X., Talhaoui, M.Z.: A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng. 139, 106485 (2021)

    Article  Google Scholar 

  22. Wang, X., Du, X.: Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solitons Fractals 155, 111629 (2022)

    Article  MathSciNet  Google Scholar 

  23. Wang, X., Guan, N., Liu, P.: A selective image encryption algorithm based on a chaotic model using modular sine arithmetic. Optik 258, 168955 (2022)

    Article  Google Scholar 

  24. Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)

    Article  MathSciNet  Google Scholar 

  25. Cao, W., Mao, Y., Zhou, Y.: Designing a 2D infinite collapse map for image encryption. Sig. Process. 171, 107457 (2020)

    Article  Google Scholar 

  26. Hua, Z., Jin, F., Xu, B., Huang, H.: 2D Logistic-Sine-coupling map for image encryption. Sig. Process. 149, 148–161 (2018)

    Article  Google Scholar 

  27. Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 450, 361–377 (2018)

    Article  MathSciNet  Google Scholar 

  28. Himeur, Y., Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools Appl. 77, 8603–8627 (2018)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Natural Science Foundation of China (62302248, 62302249, 62272255); National key research and development program of China (2021YFC3340600, 2021YFC3340602); Taishan Scholar Program (tsqn202306251); Shandong Provincial Natural Science Foundation (ZR2020MF054, ZR2023QF018, ZR2023QF032, ZR2022LZH011), Ability Improvement Project of Science and Technology SMES (2022TSGC2485, 2023TSGC0217); “20 Universities”-Project of Jinan Research Leader Studio (2020GXRC056); “New 20 Universities”-Project of Jinan Introducing Innovation Team (202228016); Youth Innovation Team of Colleges and Universities in Shandong Province (2022KJ124); The “Chunhui Plan” Cooperative Scientific Research Project of Ministry of Education (HZKY20220482); Achievement transformation of science, education and production integration pilot project (2023CGZH-05), QLUT First Talent Research Project (2023RCKY131, 2023RCKY143), QLUT Integration Pilot Project of Science Education Industry (2023PX006, 2023PY060, 2023PX071).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linna Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xian, Y., Ma, R., Liu, P., Zhou, L. (2024). Image Encryption Scheme Based on New 1D Chaotic System and Blockchain. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2585-4_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2584-7

  • Online ISBN: 978-981-97-2585-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics