IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v15y2023i6p5133-d1096798.html
   My bibliography  Save this article

Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments

Author

Listed:
  • Manal Abdullah Alohali

    (Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia)

  • Mohammed Aljebreen

    (Department of Computer Science, Community College, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia)

  • Fuad Al-Mutiri

    (Department of Mathematics, Faculty of Sciences and Arts, King Khalid University, Muhayil Asir 61913, Saudi Arabia)

  • Mahmoud Othman

    (Department of Computer Science, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt)

  • Abdelwahed Motwakel

    (Department of Information Systems, College of Business Administration in Hawtat bani Tamim, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Mohamed Ibrahim Alsaid

    (Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Amani A. Alneil

    (Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Azza Elneil Osman

    (Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

Abstract

The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital twin concept, provide advanced solutions to create a new virtual world. Due to the ongoing development of information communication technologies and broadcast channels, data security has become a major concern. Blockchain (BC) technology is an open, decentralized, and transparent distributed database that can be maintained by the group. BC’s major features are high credibility, decentralization, transparency, versatility, autonomy, traceability, anonymity, intelligence, reward mechanisms, and irreversibility. This study presents a blockchain-driven image encryption technique using arithmetic optimization with a fractional-order Lorenz system (BDIE-AOFOLS). The BDIE-AOFOLS technique uses the FOLS method, which integrates the Arnold map, tent map, and fractional Lorenz system. Besides this, an arithmetic optimization algorithm (AOA) was carried out for the optimum key generation process to achieve the maximum PSNR value. The design of an AOA-based optimal generation of keys for the FOLS technique determines the novelty of the current work. Moreover, the cryptographical pixel values of the images can be stored securely in the BC, guaranteeing image security. We compared the outcomes of the proposed BDIE-AOFOLS technique against benchmark color images. The comparative analysis demonstrated the improved security efficiency of the BDIE-AOFOLS technique over other approaches, with a mean square error of 0.0430 and a peak signal-to-noise ratio of 61.80 dB.

Suggested Citation

  • Manal Abdullah Alohali & Mohammed Aljebreen & Fuad Al-Mutiri & Mahmoud Othman & Abdelwahed Motwakel & Mohamed Ibrahim Alsaid & Amani A. Alneil & Azza Elneil Osman, 2023. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments," Sustainability, MDPI, vol. 15(6), pages 1-16, March.
  • Handle: RePEc:gam:jsusta:v:15:y:2023:i:6:p:5133-:d:1096798
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/15/6/5133/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/15/6/5133/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:6:p:5133-:d:1096798. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.