登录    注册    忘记密码    使用帮助

详细信息

Authenticated reversible image hiding algorithm based on blockchain technology  ( EI收录)   被引量:48

文献类型:期刊文献

英文题名:Authenticated reversible image hiding algorithm based on blockchain technology

作者:Ye, Guodong[1]; Chen, Zhuozhao[1]

机构:[1] Faculty of Mathematics and Computer Science, Guangdong Ocean University, Zhanjiang, 524088, China

年份:2025

卷号:28

期号:1

外文期刊名:Cluster Computing

收录:EI(收录号:20244217225927)、Scopus(收录号:2-s2.0-85206499599)

语种:英文

外文关键词:Blockchain - Inverse problems - Inverse transforms - Matrix algebra - Wavelet transforms

外文摘要:An authenticated reversible image hiding algorithm based on blockchain framework is presented in this paper. First, global eigenvalues of the plain image are extracted as plaintext keys. Meanwhile, a novel key transformation model is built, combining with public key cryptography RSA and random numbers to compute the initial values for Lorenz system. Thereby, chaotic sequences are produced. Secondly, a preprocessed model and an integer getting model are constructed to process these chaotic sequences and generate preprocessed sequences. The digital signature image and the plain image are then encrypted to obtain a cipher signature image and a cipher image. Thirdly, integer wavelet transform is executed on the carrier image to embed the cipher signature image and the cipher image in the frequency domain matrices by the least significant bit. Next, 2k correction method is employed to correct these coefficient matrices. Finally, inverse integer wavelet transform is performed on the coefficient matrices to generate the carrier image containing secrets. Especially, cipher signature image is stored in an interplanetary file system, producing content identifier hash value. Then content identifier hash value is written into smart contract and saved on Ethereum blockchain. In the stages of decryption and authentication, the receiver inquires the corresponding transaction file from blockchain by the transaction address, obtaining content identifier hash value and downloading cipher signature image from interplanetary file system. Consequently, the receiver extracts cipher signature image from carrier image containing secrets to do decryption and authentication. Experimental results show that the proposed image hiding algorithm has strong sensitivity to both key and plaintext, can resist clipping attack, and etc. ? The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心