Skip to main content
Log in

A novel block encryption method based on Catalan random walks

  • 1219: Multimedia Security Based on Quantum Cryptography and Blockchain
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel encryption method based on individual block ciphering using Catalan random walks. This paper aims to offer some new possibilities of multimedia data protection to realize the rights of participants in the multimedia distribution chain (image, text, video, sound). Also, the emphasis is on advanced analysis of Catalan numbers and their combinatorial representations in multimedia security. The proposed method consists of five phases: conversion, division, selection, encryption, and generation. We presented the application of our method in ensuring the security of multimedia content. The proposed method was implemented in Java. In the experimental testing, we provide the time and space complexity of Catalan keys generation and Maurer’s universal statistical test for the proposed method. Also, we state security analysis using machine learning methods and comparative analysis with existing methods of encrypting data into a blockchain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ablayev FM et al (2018) Quantum-assisted blockchain. Lobachevskii J Math 39(7):957–960

    Article  MathSciNet  MATH  Google Scholar 

  2. Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified playfair and chaotic system. J Inform Security Appl 51:102445

    Google Scholar 

  3. Balzarova MA (2020) Blockchain technology—a new era of ecolabelling schemes? Corp Gov Int J Bus Soc 21(1):159–174

    Google Scholar 

  4. Dubovitskaya A, Novotny P, Xu ZG, Wang FS (2020) Applications of blockchain technology for data-sharing in oncology: results from a systematic literature review. Oncology 98(6):403–411

    Article  Google Scholar 

  5. Fedorova EP, Skobleva EI (2020) Application of blockchain technology in higher education. Eur J Contemp Educ 9(3):552–571

    Google Scholar 

  6. Feng T, Pei H, Ma R, Tian Y, Feng X (2021) Blockchain data privacy access control based on searchable attribute encryption. CMC-Comput Mater Contin 66(1):871–884

    Article  Google Scholar 

  7. Filimonau V, Naumova E (2020) The blockchain technology and the scope of its application in hospitality operations. Int J Hosp Manag 87:102383

    Article  Google Scholar 

  8. Gilad-Bachrach R, Navot A, Tishby N (2004) Margin based feature selection-theory and algorithms. In: Proceedings of the twenty-first international conference on Machine learning

  9. Guo L, Xie H, Li Y (2020) Data encryption based blockchain and privacy preserving mechanisms towards big data. J Visual Commun Image Represent 70:102741

    Article  Google Scholar 

  10. Kapalova N, Khompysh A, Arici M, Algazy K (2020) A block encryption algorithm based on exponentiation transform. Cogent Eng 7(1):1788292

    Article  Google Scholar 

  11. Kendon V (2006) A random walk approach to quantum algorithms. Phil Trans R Soc A 364:3407–3422

    Article  MathSciNet  MATH  Google Scholar 

  12. Koshy T (2009) Catalan numbers with applications. Oxford University Press, New York

    MATH  Google Scholar 

  13. Lee SW, Sim KB (2021) Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security. Electronics 10(9):1127

    Article  Google Scholar 

  14. Li X, Li X (2019) A novel block image encryption algorithm based on DNA dynamic encoding and chaotic system. 2019 IEEE 4th international conference on signal and image processing (ICSIP). IEEE, Wuxi, pp 901–906

    Chapter  Google Scholar 

  15. Li L, Pang B, Tang Y (2017) An image encryption system based on 2-dimensional quantum random walks. 2017 international conference on wavelet analysis and pattern recognition (ICWAPR). IEEE, Ningbo, pp 93–98

    Chapter  Google Scholar 

  16. Liang M, Yang L (2020) Block encryption of quantum messages. Quantum Inf Process 19(4):1–25

    Article  MathSciNet  Google Scholar 

  17. Luo W, Tan J (2020) Regulatable user privacy protection model of blockchain with encryption on sensitive data. Basic & clinical pharmacology & toxicology, vol 126. Wiley, Hoboken, pp 217–218

    Google Scholar 

  18. Ma YL, Li CQ, Ou B (2020) Cryptanalysis of an image block encryption algorithm based on chaotic maps. J Inform Security Appl 54:102566

    Google Scholar 

  19. Manzoor A, Liyanage M, Braeke A, Kanhere SS, Ylianttila M (2019) Blockchain based proxy re-encryption scheme for secure IoT data sharing. 2019 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, Seoul, pp 99–103

    Chapter  Google Scholar 

  20. Maurer U (1992) A universal statistical test for random bit generators. J Cryptol 5(2):89–105

    Article  MathSciNet  MATH  Google Scholar 

  21. Maurer U (1993) Secret key agreement by public discussion from common information. IEEE Trans Inform Theory 39(3):733–742

    Article  MathSciNet  MATH  Google Scholar 

  22. Omar IA, Jayaraman R, Salah K, Yaqoob I, Ellahham S (2020) Applications of blockchain technology in clinical trials: review and open challenges. Arab J Sci Eng 46:3001–3015

    Article  Google Scholar 

  23. Pal O, Alam B (2019) Efficient and secure conditional access system for pay-TV systems. Multimed Tools Appl 78:18835–18853

    Article  Google Scholar 

  24. Pal O, Alam B (2020) Efficient and secure key management for conditional access systems. IEEE Trans Consum Electron 66(1):1–10

    Article  Google Scholar 

  25. Pal O, Alam B, Thakur V, Singh S (2019) Key management for blockchain technology. ICT Express 7:76–80

    Article  Google Scholar 

  26. Rodrigo MNN, Perera S, Senaratne S, Jin XH (2020) Potential application of blockchain technology for embodied carbon estimating in construction supply chains. Buildings 10(8):140

    Article  Google Scholar 

  27. Saba S (2018) Generating all balanced parentheses: a deep dive into an interview question, MathCode. Available at https://sahandsaba.com/interview-question-generating-all-balanced. Accessed 30 Jun 2021

  28. Sanders J, Proutiere A, Yun SY (2020) Clustering in block markov chains. Ann Stat 48(6):3488–3512

    Article  MathSciNet  MATH  Google Scholar 

  29. Sapra R, Dhaliwal P (2021) Blockchain: the perspective future of technology. Int J Healthc Inform Syst Inform 16(2):1–20

    Article  Google Scholar 

  30. Saračević M, Adamovic S, Bisevac E (2018) Applications of Catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung 15(7):91–110

    Google Scholar 

  31. Saračević M, Adamovic S, Miskovic V, Macek N, Sarac M (2019) A novel approach to steganography based on the properties of Catalan numbers and Dyck words. Futur Gener Comput Syst 100:186–197

    Article  Google Scholar 

  32. Saračević MH, Adamović SZ, Miškovic VA, Elhoseny M, Maček ND, Selim MM, Shankar K (2020) Data encryption for Internet of Things applications based on Catalan objects and two combinatorial structures. IEEE Trans Reliab 70(2):819–830

    Article  Google Scholar 

  33. Saračević M, Adamović S, Macek N, Elhoseny M, Sarhan S (2020) Cryptographic keys exchange model for smart city applications. IET Intel Transport Syst 14(11):1456–1464

    Article  Google Scholar 

  34. Saračević M, Adamović S, Maček N, Selimi A, Pepic S (2021) Source and channel models for secret-key agreement based on Catalan numbers and the lattice path combinatorial approach. J Inf Sci Eng 37(2):469–482

    Google Scholar 

  35. Siva Kumar A, Godfrey Winster S, Ramesh R (2021) Efficient sensitivity orient blockchain encryption for improved data security in cloud. Concurr Eng. https://doi.org/10.1177/1063293X211008586

    Article  Google Scholar 

  36. Stanley R (2005) Catalan addendum to enumerative combinatorics. MIT Mathematics, Cambridge

    Google Scholar 

  37. Ur Rehman A, Xiao D, Kulsoom A, Hashmi MA, Abbas SA (2019) Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl 78(7):9355–9382

    Article  Google Scholar 

  38. Wang J, Wang XM, Cheng HX (2020) Application of blockchain technology in the governance of executive corruption in context of national audit. TehnickiVjesnik—Tech Gaz 27(6):1774–1780

    MathSciNet  Google Scholar 

  39. Xu C, Sun JR, Wang CH (2020) An image encryption algorithm based on random walk and hyperchaotic systems. Int J Bifurc Chaos 30(4):2050060

    Article  MathSciNet  Google Scholar 

  40. Yang C, Chiu C, Wu G (2011) Efficient encoding/decoding for second-order spectral-null codes by reducing random walks. IEEE Trans Comput 60(10):1503–1510

    Article  MathSciNet  MATH  Google Scholar 

  41. Zhang HJ, Wu SF, Wang SK, Xia N (2020) Application of blockchain technology in pet medical industry. Basic Clin Pharmacol Toxicol 126:183–183

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Methodology (MS, SKS); Resources (MS, KA); Conceptualization (SKS).

Corresponding author

Correspondence to Khaleel Ahmad.

Ethics declarations

Research involving human and/or animal participants

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saračević, M., Sharma, S.K. & Ahmad, K. A novel block encryption method based on Catalan random walks. Multimed Tools Appl 81, 36667–36684 (2022). https://doi.org/10.1007/s11042-021-11497-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11497-5

Keywords