An Integrated Arnold and Bessel Function-based Image Encryption on Blockchain

Images store large amount of information that are used in visual representation, analysis, and expression of data. Storage and retrieval of images possess a greater challenge to researchers globally. This research paper presents an integrated approach for image encryption and decryption using an Arn...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of advanced computer science & applications Vol. 15; no. 4
Main Authors Yadav, Abhay Kumar, Vishwakarma, Virendra P.
Format Journal Article
LanguageEnglish
Published West Yorkshire Science and Information (SAI) Organization Limited 2024
Subjects
Online AccessGet full text
ISSN2158-107X
2156-5570
2156-5570
DOI10.14569/IJACSA.2024.0150482

Cover

More Information
Summary:Images store large amount of information that are used in visual representation, analysis, and expression of data. Storage and retrieval of images possess a greater challenge to researchers globally. This research paper presents an integrated approach for image encryption and decryption using an Arnold map and first-order Bessel function-based chaos. Traditional methods of image encryption are generally based on single algorithms or techniques, making them vulnerable to various security threats. To address these challenges, our novel method combines the robustness of Arnold transformation with the unique properties of Bessel functions-based chaos. Furthermore, we implemented the decentralized nature of blockchain technology for storing and managing encryption keys securely. By utilizing blockchain's tamper-resistant and transparent ledger, we enhance the integrity and traceability of the encryption process, mitigating the risk of unauthorized access or tampering. The proposed method leverages the chaotic behavior of Bessel function for enhancing security of encryption process. A chaos obtained from first order Bessel function has been utilized for encryption key for encryption after Arnold transformation. The obtained cypher text is stored in blockchain in form of encrypted blocks for secured storage and added security. Experimental evaluations demonstrate the efficiency, effectiveness and robustness of our proposed encryption method when compared with performance of previously developed techniques highlighting the superiority of the proposed method in protecting image data against unauthorized access.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2158-107X
2156-5570
2156-5570
DOI:10.14569/IJACSA.2024.0150482