Fingerprint-related chaotic image encryption scheme based on blockchain framework
Chaotic image encryption has been greatly investigated in recent years. However, a considerable number of the encryption schemes had been cracked by chosen plaintext attack (CPA). Although the new proposed plaintext-related chaotic image encryption schemes can resist CPA effectively, the emerged key...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2021-08, Vol.80 (20), p.30583-30603 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 30603 |
---|---|
container_issue | 20 |
container_start_page | 30583 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Li, Ruiping |
description | Chaotic image encryption has been greatly investigated in recent years. However, a considerable number of the encryption schemes had been cracked by chosen plaintext attack (CPA). Although the new proposed plaintext-related chaotic image encryption schemes can resist CPA effectively, the emerged key management problem is a hot potato. In this paper, a novel fingerprint-related chaotic image encryption scheme is proposed. The generation of key streams is affected by the fingerprints of distributors rather than the plaintexts of images. In addition, the blockchain framework is adopted to ensure that the encrypted image was sent correctly form the distributor. Moreover, the distributors’ fingerprints embedded in the encrypted images are encoded by the anti-collusion code in order to record multiple fingerprints with fixed length of data. The proposed method has the following superiorities: 1) Security. CPA is invalid because the attacker does not have the fingerprint of the legal receiver. Meanwhile, no key management problem is caused. 2) Authenticity. The image, the sender and the receiver are all verified by using blockchain framework. 3) Traceability. All distributors’ fingerprints can be extracted correctly from the merged fingerprint based on the anti-collusion code, and the transmission of the image can be traced. |
doi_str_mv | 10.1007/s11042-020-08802-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2572731242</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2572731242</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-4878982c5abbd1f3f4c099e9c0f203c377b46e82ac1420f80831ded5d4bd615e3</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wNOC5-hMkm2yRylWBUEEPYdsdrbdfuzWZIu0v97UFbx5mhl43hnmYewa4RYB9F1EBCU4COBgDAh-OGEjzLXkWgs8Tb00wHUOeM4uYlwC4CQXasTeZk07p7ANTdvzQGvXU5X5hev6xmfNxs0po9aH_bZvujaLfkEbykoXE5Xmct35VaKbNquD29BXF1aX7Kx260hXv3XMPmYP79Mn_vL6-Dy9f-FeYtFzZbQpjPC5K8sKa1krD0VBhYdagPRS61JNyAjnUQmoDRiJFVV5pcpqgjnJMbsZ9m5D97mj2NtltwttOmlFroWWKJRIlBgoH7oYA9U2vbpxYW8R7FGdHdTZpM7-qLOHFJJDKB69JD1_q_9JfQOPjHJ-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2572731242</pqid></control><display><type>article</type><title>Fingerprint-related chaotic image encryption scheme based on blockchain framework</title><source>SpringerLink Journals - AutoHoldings</source><creator>Li, Ruiping</creator><creatorcontrib>Li, Ruiping</creatorcontrib><description>Chaotic image encryption has been greatly investigated in recent years. However, a considerable number of the encryption schemes had been cracked by chosen plaintext attack (CPA). Although the new proposed plaintext-related chaotic image encryption schemes can resist CPA effectively, the emerged key management problem is a hot potato. In this paper, a novel fingerprint-related chaotic image encryption scheme is proposed. The generation of key streams is affected by the fingerprints of distributors rather than the plaintexts of images. In addition, the blockchain framework is adopted to ensure that the encrypted image was sent correctly form the distributor. Moreover, the distributors’ fingerprints embedded in the encrypted images are encoded by the anti-collusion code in order to record multiple fingerprints with fixed length of data. The proposed method has the following superiorities: 1) Security. CPA is invalid because the attacker does not have the fingerprint of the legal receiver. Meanwhile, no key management problem is caused. 2) Authenticity. The image, the sender and the receiver are all verified by using blockchain framework. 3) Traceability. All distributors’ fingerprints can be extracted correctly from the merged fingerprint based on the anti-collusion code, and the transmission of the image can be traced.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-020-08802-z</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Blockchain ; Collusion ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Distributors ; Encryption ; Fingerprints ; Image transmission ; Multimedia Information Systems ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2021-08, Vol.80 (20), p.30583-30603</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-4878982c5abbd1f3f4c099e9c0f203c377b46e82ac1420f80831ded5d4bd615e3</citedby><cites>FETCH-LOGICAL-c319t-4878982c5abbd1f3f4c099e9c0f203c377b46e82ac1420f80831ded5d4bd615e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-020-08802-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-020-08802-z$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,41487,42556,51318</link.rule.ids></links><search><creatorcontrib>Li, Ruiping</creatorcontrib><title>Fingerprint-related chaotic image encryption scheme based on blockchain framework</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Chaotic image encryption has been greatly investigated in recent years. However, a considerable number of the encryption schemes had been cracked by chosen plaintext attack (CPA). Although the new proposed plaintext-related chaotic image encryption schemes can resist CPA effectively, the emerged key management problem is a hot potato. In this paper, a novel fingerprint-related chaotic image encryption scheme is proposed. The generation of key streams is affected by the fingerprints of distributors rather than the plaintexts of images. In addition, the blockchain framework is adopted to ensure that the encrypted image was sent correctly form the distributor. Moreover, the distributors’ fingerprints embedded in the encrypted images are encoded by the anti-collusion code in order to record multiple fingerprints with fixed length of data. The proposed method has the following superiorities: 1) Security. CPA is invalid because the attacker does not have the fingerprint of the legal receiver. Meanwhile, no key management problem is caused. 2) Authenticity. The image, the sender and the receiver are all verified by using blockchain framework. 3) Traceability. All distributors’ fingerprints can be extracted correctly from the merged fingerprint based on the anti-collusion code, and the transmission of the image can be traced.</description><subject>Blockchain</subject><subject>Collusion</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Distributors</subject><subject>Encryption</subject><subject>Fingerprints</subject><subject>Image transmission</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1LAzEQhoMoWKt_wNOC5-hMkm2yRylWBUEEPYdsdrbdfuzWZIu0v97UFbx5mhl43hnmYewa4RYB9F1EBCU4COBgDAh-OGEjzLXkWgs8Tb00wHUOeM4uYlwC4CQXasTeZk07p7ANTdvzQGvXU5X5hev6xmfNxs0po9aH_bZvujaLfkEbykoXE5Xmct35VaKbNquD29BXF1aX7Kx260hXv3XMPmYP79Mn_vL6-Dy9f-FeYtFzZbQpjPC5K8sKa1krD0VBhYdagPRS61JNyAjnUQmoDRiJFVV5pcpqgjnJMbsZ9m5D97mj2NtltwttOmlFroWWKJRIlBgoH7oYA9U2vbpxYW8R7FGdHdTZpM7-qLOHFJJDKB69JD1_q_9JfQOPjHJ-</recordid><startdate>20210801</startdate><enddate>20210801</enddate><creator>Li, Ruiping</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20210801</creationdate><title>Fingerprint-related chaotic image encryption scheme based on blockchain framework</title><author>Li, Ruiping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-4878982c5abbd1f3f4c099e9c0f203c377b46e82ac1420f80831ded5d4bd615e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Blockchain</topic><topic>Collusion</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Distributors</topic><topic>Encryption</topic><topic>Fingerprints</topic><topic>Image transmission</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Ruiping</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Ruiping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Fingerprint-related chaotic image encryption scheme based on blockchain framework</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-08-01</date><risdate>2021</risdate><volume>80</volume><issue>20</issue><spage>30583</spage><epage>30603</epage><pages>30583-30603</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Chaotic image encryption has been greatly investigated in recent years. However, a considerable number of the encryption schemes had been cracked by chosen plaintext attack (CPA). Although the new proposed plaintext-related chaotic image encryption schemes can resist CPA effectively, the emerged key management problem is a hot potato. In this paper, a novel fingerprint-related chaotic image encryption scheme is proposed. The generation of key streams is affected by the fingerprints of distributors rather than the plaintexts of images. In addition, the blockchain framework is adopted to ensure that the encrypted image was sent correctly form the distributor. Moreover, the distributors’ fingerprints embedded in the encrypted images are encoded by the anti-collusion code in order to record multiple fingerprints with fixed length of data. The proposed method has the following superiorities: 1) Security. CPA is invalid because the attacker does not have the fingerprint of the legal receiver. Meanwhile, no key management problem is caused. 2) Authenticity. The image, the sender and the receiver are all verified by using blockchain framework. 3) Traceability. All distributors’ fingerprints can be extracted correctly from the merged fingerprint based on the anti-collusion code, and the transmission of the image can be traced.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-020-08802-z</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-08, Vol.80 (20), p.30583-30603 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2572731242 |
source | SpringerLink Journals - AutoHoldings |
subjects | Blockchain Collusion Computer Communication Networks Computer Science Cryptography Data Structures and Information Theory Distributors Encryption Fingerprints Image transmission Multimedia Information Systems Special Purpose and Application-Based Systems |
title | Fingerprint-related chaotic image encryption scheme based on blockchain framework |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T08%3A28%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Fingerprint-related%20chaotic%20image%20encryption%20scheme%20based%20on%20blockchain%20framework&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Li,%20Ruiping&rft.date=2021-08-01&rft.volume=80&rft.issue=20&rft.spage=30583&rft.epage=30603&rft.pages=30583-30603&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-020-08802-z&rft_dat=%3Cproquest_cross%3E2572731242%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2572731242&rft_id=info:pmid/&rfr_iscdi=true |