Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

An example of partition security sharing of images.

More »

Fig 1 Expand

Table 1.

Summary of related work.

More »

Table 1 Expand

Fig 2.

The flow chart of the chaotic encryption algorithm.

More »

Fig 2 Expand

Fig 3.

The on-chain and off-chain collaborative sharing architecture.

More »

Fig 3 Expand

Fig 4.

The access control process.

More »

Fig 4 Expand

Fig 5.

The method to construct the Cuckoo filter for the transactions on the blockchain.

More »

Fig 5 Expand

Fig 6.

The block diagram of the proposed encryption scheme.

More »

Fig 6 Expand

Fig 7.

The flowchart of the proposed chaotic encryption algorithm.

More »

Fig 7 Expand

Fig 8.

The upload process of shared image.

More »

Fig 8 Expand

Fig 9.

The acquisition process of shared image.

More »

Fig 9 Expand

Fig 10.

The histogram of image pixel distribution.

More »

Fig 10 Expand

Table 2.

The correlation analysis results of adjacent pixels.

More »

Table 2 Expand

Table 3.

Chi-square analysis.

More »

Table 3 Expand

Table 4.

Information entropy analysis.

(‘CR’ represents the image compression ratio).

More »

Table 4 Expand

Table 5.

Key sensitivity analysis.

More »

Table 5 Expand

Table 6.

Anti-differential attack analysis.

More »

Table 6 Expand

Fig 11.

The decrypted image under Gaussian noises and salt and pepper noises.

More »

Fig 11 Expand

Table 7.

Time complexity analysis.

More »

Table 7 Expand

Fig 12.

Evaluation of retrieval efficiency.

More »

Fig 12 Expand

Fig 13.

The upload time of shared images.

More »

Fig 13 Expand

Fig 14.

The encryption time of the proposed chaotic algorithm and AES.

More »

Fig 14 Expand

Fig 15.

The file sizes of AES plain image and cipher image.

More »

Fig 15 Expand

Fig 16.

The download time of shared images.

More »

Fig 16 Expand

Fig 17.

The decryption time of the proposed chaotic algorithm and AES.

More »

Fig 17 Expand

Table 8.

Comparison with related works.

More »

Table 8 Expand