Submitted:
24 December 2023
Posted:
26 December 2023
You are already at the latest version
Abstract

Keywords:
1. Introduction
1.1. Background
1.2. Related Work
1.3. Contribution
- We propose using NFTs as carriers for sensitive data in cross-border transfers, ensuring secure and authorized access. Harnessing the unique properties of NFTs, we employ the immutable NFT data as a tamper-proof pointer, guaranteeing the authenticity and provenance of the sensitive information. Meanwhile, the mutable NFT data serves as a secure container for the sensitive content itself. This allows for dynamic updates to reflect changes in users’ data, ensuring the information remains current and relevant.
- To address the public accessibility of NFT metadata, we propose leveraging the power of steganography. This enables us to both conceal sensitive information and enhance its protection, offering an effective solution for privacy-conscious users.
- To ensure secure and private user mobility across businesses, we propose an approach that prioritizes user data privacy and integrity during transitions. This objective is achieved through the application of a strong cryptographic technique, specifically OTP, which aligns with our model’s security requirements.
- A structured performance analysis is conducted to assess the practicality and effectiveness of implementing this proposed methodology in real-world scenarios.
1.4. Paper Organization
2. Materials and Methods
2.1. Technical Definitions
2.1.1. Steganography
2.1.2. One-Time Pad (OTP)
2.1.3. NFTs
2.1.4. Smart Contract
2.2. Tracing Model Operations
2.2.1. Sensing Data Collection
2.2.2. Priming NFTs for Use
2.2.3. Scenario
2.2.4. User Mobility
| Algorithm 1: Secure Password Transmission |
|
Input: Steganography password P, User’s OTP K
Output: Decrypted password P for sensative data access
|
| Algorithm 2: User Data Migration from B1 to B2 |
![]() |
3. Setup and Implementation
3.1. Environment Setup
3.2. Performance Metrics
3.3. Parameter Settings and Configurations
3.3.1. Embedding Algorithm
3.3.2. Data Size
3.3.3. Image Type and Size
3.4. Password Complexity
3.4.1. Encryption Mode
4. Results and Discussion
4.1. Impact of Embedding Algorithm
4.2. Impact of Data Size
4.3. Image Type
4.4. Impact of Password Complexity
4.5. Impact of Encryption Mode
5. Conclusions
References
- Jin, H.; Luo, Y.; Li, P.; Mathew, J. A review of secure and privacy-preserving medical data sharing. IEEE Access 2019, 7, 61656–61669. [Google Scholar] [CrossRef]
- Liu, Z.; Li, Z. A blockchain-based framework of cross-border e-commerce supply chain. International Journal of Information Management 2020, 52, 102059. [Google Scholar] [CrossRef]
- Kim, S.; Kim, D. Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System. Sensors 2023, 23, 2914. [Google Scholar] [CrossRef]
- Zhao, H. A cross-border E-commerce approach based on blockchain technology. Mob. Inf. Syst 2021, 2006082. [Google Scholar] [CrossRef]
- Zhang, L.; Xie, Y.; Zheng, Y.; Xue, W.; Zheng, X.; Xu, X. The challenges and countermeasures of blockchain in finance and economics. Systems Research and Behavioral Science 2020, 37, 691–698. [Google Scholar] [CrossRef]
- Cornelius, K. Betraying blockchain: accountability, transparency and document standards for non-fungible tokens (nfts). Information 2021, 12, 358. [Google Scholar] [CrossRef]
- Rehman, W.; e Zainab, H.; Imran, J.; Bawany, N.Z. NFTs: Applications and challenges. 2021 22nd International Arab Conference on Information Technology (ACIT). IEEE, 2021, pp. 1–7. [CrossRef]
- Baker, B.; Pizzo, A.; Su, Y. Non-fungible tokens: a research primer and implications for sport management. Sports Innovation Journal 2022, 3, 1–15. [Google Scholar] [CrossRef] [PubMed]
- Teplova, T.; Kurkin, A.; Baklanova, V. Investor sentiment and the NFT market: prediction and interpretation of daily NFT sales volume. Annals of Operations Research 2023, pp. 1–25. [CrossRef]
- Tahmasbi, N.; Shan, G.; French, A.M. Identifying Washtrading Cases in NFT Sales Networks. IEEE Transactions on Computational Social Systems 2023. [Google Scholar] [CrossRef]
- Kang, J.Y.; Bae, Y.S.; Chie, E.K.; Lee, S.B. Predicting Deterioration from Wearable Sensor Data in People with Mild COVID-19. Sensors 2023, 23, 9597. [Google Scholar] [CrossRef]
- Wang, J.; Han, K.; Alexandridis, A.; Chen, Z.; Zilic, Z.; Pang, Y.; Jeon, G.; Piccialli, F. A blockchain-based eHealthcare system interoperating with WBANs. Future Generation computer systems 2020, 110, 675–685. [Google Scholar] [CrossRef]
- Wang, D.H. IoT based clinical sensor data management and transfer using blockchain technology. Journal of IoT in Social, Mobile, Analytics, and Cloud 2020, 2, 154–159. [Google Scholar]
- Anbarasan, H.S.; Natarajan, J. Blockchain Based Delay and Energy Harvest Aware Healthcare Monitoring System in WBAN Environment. Sensors 2022, 22, 5763. [Google Scholar] [CrossRef]
- Taralunga, D.D.; Florea, B.C. A blockchain-enabled framework for mhealth systems. Sensors 2021, 21, 2828. [Google Scholar] [CrossRef] [PubMed]
- Chen, Y.; Wang, Z.; Liu, X.; Wei, X. A New NFT Model to Enhance Copyright Traceability of the Off-chain Data. 2022 International Conference on Culture-Oriented Science and Technology (CoST). IEEE, 2022, pp. 157–162. [CrossRef]
- Wang, N.; Sajjanhar, A.; Xiang, Y.; Gao, L. A Robust NFT Assisted Knowledge Distillation Framework for Edge Computing. International Conference on Testbeds and Research Infrastructures. Springer, 2022, pp. 20–31.
- Hocaoğlu, M.; HABBAL, A. NFT based model to manage educational assets in Metaverse. Avrupa Bilim ve Teknoloji Dergisi 2022, pp. 20–25.
- Elmessiry, A.; Elmessiry, M.; Bridgesmith, L. NFT student teacher incentive system (NFT-stis). Available at SSRN 4120879 2021.
- Ren, Y.; Xie, R.; Yu, F.R.; Huang, T.; Liu, Y. NFT-based intelligence networking for connected and autonomous vehicles: A quantum reinforcement learning approach. IEEE Network 2022, 36, 116–124. [Google Scholar] [CrossRef]
- Gebreab, S.A.; Hasan, H.R.; Salah, K.; Jayaraman, R. NFT-based traceability and ownership management of medical devices. IEEE Access 2022, 10, 126394–126411. [Google Scholar] [CrossRef]
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing 2004, 13, 600–612. [Google Scholar] [CrossRef]
- Saladi, S.; Amutha Prabha, N. Analysis of denoising filters on MRI brain images. International Journal of Imaging Systems and Technology 2017, 27, 201–208. [Google Scholar] [CrossRef]





| PSNR(dB) | SSIM | Encryption Execution Time(Sec) | Decryption Execution Time(Sec) | |
|---|---|---|---|---|
| LSB | 85.36 | 0.99 | 0.089 | 0.025 |
| DCT | 32.92 | 0.97 | 0.022 | 0.001 |
| DWT | 30.72 | 0.94 | 0.058 | 0.007 |
| PSNR(dB) | SSIM | Encryption Execution Time(Sec) | Decryption Execution Time(Sec) | |
|---|---|---|---|---|
| 1 KB | 82.009 | 0.999 | 0.053 | 0.021 |
| 10 KB | 62.872 | 0.999 | 0.163 | 0.119 |
| 20 KB | 59.747 | 0.999 | 0.273 | 0.209 |
| PSNR(dB) | SSIM | Encryption Execution Time(Sec) | Decryption Execution Time(Sec) | |
|---|---|---|---|---|
| JPEG | 79.669 | 0.999 | 0.059 | 0.021 |
| PNG | 93.845 | 0.999 | 0.262 | 0.054 |
| PSNR(dB) | SSIM | Encryption Execution Time(Sec) | Decryption Execution Time(Sec) | |
|---|---|---|---|---|
| Weak | 81.941 | 0.999 | 0.052 | 0.029 |
| Moderate | 82.483 | 0.999 | 0.053 | 0.020 |
| Strong | 81.836 | 0.999 | 0.054 | 0.020 |
| PSNR(dB) | SSIM | Encryption Execution Time(Sec) | Decryption Execution Time(Sec) | |
|---|---|---|---|---|
| CBC | 82.027 | 0.999 | 0.053 | 0.019 |
| CFB | 82.379 | 0.999 | 0.051 | 0.018 |
| CTR | 82.070 | 0.999 | 0.052 | 0.019 |
| OFB | 82.050 | 0.999 | 0.049 | 0.017 |
| GCM | 81.949 | 0.999 | 0.051 | 0.020 |
| ECB | 82.035 | 0.999 | 0.050 | 0.018 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
