Abstract
This paper presents a novel encryption method based on individual block ciphering using Catalan random walks. This paper aims to offer some new possibilities of multimedia data protection to realize the rights of participants in the multimedia distribution chain (image, text, video, sound). Also, the emphasis is on advanced analysis of Catalan numbers and their combinatorial representations in multimedia security. The proposed method consists of five phases: conversion, division, selection, encryption, and generation. We presented the application of our method in ensuring the security of multimedia content. The proposed method was implemented in Java. In the experimental testing, we provide the time and space complexity of Catalan keys generation and Maurer’s universal statistical test for the proposed method. Also, we state security analysis using machine learning methods and comparative analysis with existing methods of encrypting data into a blockchain.










Similar content being viewed by others
References
Ablayev FM et al (2018) Quantum-assisted blockchain. Lobachevskii J Math 39(7):957–960
Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified playfair and chaotic system. J Inform Security Appl 51:102445
Balzarova MA (2020) Blockchain technology—a new era of ecolabelling schemes? Corp Gov Int J Bus Soc 21(1):159–174
Dubovitskaya A, Novotny P, Xu ZG, Wang FS (2020) Applications of blockchain technology for data-sharing in oncology: results from a systematic literature review. Oncology 98(6):403–411
Fedorova EP, Skobleva EI (2020) Application of blockchain technology in higher education. Eur J Contemp Educ 9(3):552–571
Feng T, Pei H, Ma R, Tian Y, Feng X (2021) Blockchain data privacy access control based on searchable attribute encryption. CMC-Comput Mater Contin 66(1):871–884
Filimonau V, Naumova E (2020) The blockchain technology and the scope of its application in hospitality operations. Int J Hosp Manag 87:102383
Gilad-Bachrach R, Navot A, Tishby N (2004) Margin based feature selection-theory and algorithms. In: Proceedings of the twenty-first international conference on Machine learning
Guo L, Xie H, Li Y (2020) Data encryption based blockchain and privacy preserving mechanisms towards big data. J Visual Commun Image Represent 70:102741
Kapalova N, Khompysh A, Arici M, Algazy K (2020) A block encryption algorithm based on exponentiation transform. Cogent Eng 7(1):1788292
Kendon V (2006) A random walk approach to quantum algorithms. Phil Trans R Soc A 364:3407–3422
Koshy T (2009) Catalan numbers with applications. Oxford University Press, New York
Lee SW, Sim KB (2021) Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security. Electronics 10(9):1127
Li X, Li X (2019) A novel block image encryption algorithm based on DNA dynamic encoding and chaotic system. 2019 IEEE 4th international conference on signal and image processing (ICSIP). IEEE, Wuxi, pp 901–906
Li L, Pang B, Tang Y (2017) An image encryption system based on 2-dimensional quantum random walks. 2017 international conference on wavelet analysis and pattern recognition (ICWAPR). IEEE, Ningbo, pp 93–98
Liang M, Yang L (2020) Block encryption of quantum messages. Quantum Inf Process 19(4):1–25
Luo W, Tan J (2020) Regulatable user privacy protection model of blockchain with encryption on sensitive data. Basic & clinical pharmacology & toxicology, vol 126. Wiley, Hoboken, pp 217–218
Ma YL, Li CQ, Ou B (2020) Cryptanalysis of an image block encryption algorithm based on chaotic maps. J Inform Security Appl 54:102566
Manzoor A, Liyanage M, Braeke A, Kanhere SS, Ylianttila M (2019) Blockchain based proxy re-encryption scheme for secure IoT data sharing. 2019 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, Seoul, pp 99–103
Maurer U (1992) A universal statistical test for random bit generators. J Cryptol 5(2):89–105
Maurer U (1993) Secret key agreement by public discussion from common information. IEEE Trans Inform Theory 39(3):733–742
Omar IA, Jayaraman R, Salah K, Yaqoob I, Ellahham S (2020) Applications of blockchain technology in clinical trials: review and open challenges. Arab J Sci Eng 46:3001–3015
Pal O, Alam B (2019) Efficient and secure conditional access system for pay-TV systems. Multimed Tools Appl 78:18835–18853
Pal O, Alam B (2020) Efficient and secure key management for conditional access systems. IEEE Trans Consum Electron 66(1):1–10
Pal O, Alam B, Thakur V, Singh S (2019) Key management for blockchain technology. ICT Express 7:76–80
Rodrigo MNN, Perera S, Senaratne S, Jin XH (2020) Potential application of blockchain technology for embodied carbon estimating in construction supply chains. Buildings 10(8):140
Saba S (2018) Generating all balanced parentheses: a deep dive into an interview question, MathCode. Available at https://sahandsaba.com/interview-question-generating-all-balanced. Accessed 30 Jun 2021
Sanders J, Proutiere A, Yun SY (2020) Clustering in block markov chains. Ann Stat 48(6):3488–3512
Sapra R, Dhaliwal P (2021) Blockchain: the perspective future of technology. Int J Healthc Inform Syst Inform 16(2):1–20
Saračević M, Adamovic S, Bisevac E (2018) Applications of Catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung 15(7):91–110
Saračević M, Adamovic S, Miskovic V, Macek N, Sarac M (2019) A novel approach to steganography based on the properties of Catalan numbers and Dyck words. Futur Gener Comput Syst 100:186–197
Saračević MH, Adamović SZ, Miškovic VA, Elhoseny M, Maček ND, Selim MM, Shankar K (2020) Data encryption for Internet of Things applications based on Catalan objects and two combinatorial structures. IEEE Trans Reliab 70(2):819–830
Saračević M, Adamović S, Macek N, Elhoseny M, Sarhan S (2020) Cryptographic keys exchange model for smart city applications. IET Intel Transport Syst 14(11):1456–1464
Saračević M, Adamović S, Maček N, Selimi A, Pepic S (2021) Source and channel models for secret-key agreement based on Catalan numbers and the lattice path combinatorial approach. J Inf Sci Eng 37(2):469–482
Siva Kumar A, Godfrey Winster S, Ramesh R (2021) Efficient sensitivity orient blockchain encryption for improved data security in cloud. Concurr Eng. https://doi.org/10.1177/1063293X211008586
Stanley R (2005) Catalan addendum to enumerative combinatorics. MIT Mathematics, Cambridge
Ur Rehman A, Xiao D, Kulsoom A, Hashmi MA, Abbas SA (2019) Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl 78(7):9355–9382
Wang J, Wang XM, Cheng HX (2020) Application of blockchain technology in the governance of executive corruption in context of national audit. TehnickiVjesnik—Tech Gaz 27(6):1774–1780
Xu C, Sun JR, Wang CH (2020) An image encryption algorithm based on random walk and hyperchaotic systems. Int J Bifurc Chaos 30(4):2050060
Yang C, Chiu C, Wu G (2011) Efficient encoding/decoding for second-order spectral-null codes by reducing random walks. IEEE Trans Comput 60(10):1503–1510
Zhang HJ, Wu SF, Wang SK, Xia N (2020) Application of blockchain technology in pet medical industry. Basic Clin Pharmacol Toxicol 126:183–183
Author information
Authors and Affiliations
Contributions
Methodology (MS, SKS); Resources (MS, KA); Conceptualization (SKS).
Corresponding author
Ethics declarations
Research involving human and/or animal participants
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Saračević, M., Sharma, S.K. & Ahmad, K. A novel block encryption method based on Catalan random walks. Multimed Tools Appl 81, 36667–36684 (2022). https://doi.org/10.1007/s11042-021-11497-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11497-5