Fig 1.
An example of partition security sharing of images.
Table 1.
Summary of related work.
Fig 2.
The flow chart of the chaotic encryption algorithm.
Fig 3.
The on-chain and off-chain collaborative sharing architecture.
Fig 4.
The access control process.
Fig 5.
The method to construct the Cuckoo filter for the transactions on the blockchain.
Fig 6.
The block diagram of the proposed encryption scheme.
Fig 7.
The flowchart of the proposed chaotic encryption algorithm.
Fig 8.
The upload process of shared image.
Fig 9.
The acquisition process of shared image.
Fig 10.
The histogram of image pixel distribution.
Table 2.
The correlation analysis results of adjacent pixels.
Table 3.
Chi-square analysis.
Table 4.
(‘CR’ represents the image compression ratio).
Table 5.
Key sensitivity analysis.
Table 6.
Anti-differential attack analysis.
Fig 11.
The decrypted image under Gaussian noises and salt and pepper noises.
Table 7.
Time complexity analysis.
Fig 12.
Evaluation of retrieval efficiency.
Fig 13.
The upload time of shared images.
Fig 14.
The encryption time of the proposed chaotic algorithm and AES.
Fig 15.
The file sizes of AES plain image and cipher image.
Fig 16.
The download time of shared images.
Fig 17.
The decryption time of the proposed chaotic algorithm and AES.
Table 8.
Comparison with related works.