A Secure Blockchain-Based Communication System with Multimedia Encryption and Real-Time Consensus Visualization

Abstract

Safe communication is of essence in this digital age, particularly with the explosive increase in multimedia information. In this paper, the design and implementation of Secure Blockchain-Based Communication System that uses Fernet encryption on multimedia data (text, images, audio, and video) and blockchain technology to perform decentralized logging and real-time verification is presented. The suggested system will combine symmetric encryption and a tailor-made blockchain platform to provide confidentiality, integrity, and authenticity of the data transmitted. Every message is then encrypted with the help of a specific symmetric key and is stored on a blockchain, where Proof-of-Work (PoW) consensus ensures the data integrity. The graphical user interface (GUI) created with Python and Tkinter enables a user to communicate with the encryption and decryption modules, track real-time blockchain growth and performance indicators. The performance of the system was tested widely to prove that the system secured the multimedia data transmission and also could scale with the growth of the blockchain. The combination of blockchain delivers the impossibility of tampering with data validation, and the visualization of the real-time consensus gives a transparent insight into the inner workings of the blockchain, and the system is applicable in secure messaging with journalists, imaging in the medical field, and surveillance data.

Country : Iraq

1 Jaafar S. Ali2 Ayman N. Muhi3 Mustafa Ghanim4 Mohaimen Q. Algburi

  1. College of Communication Engineering, University of Technology- Iraq
  2. College of Communication Engineering, University of Technology- Iraq
  3. College of Communication Engineering, University of Technology- Iraq
  4. College of Communication Engineering, University of Technology- Iraq

IRJIET, Volume 10, Issue 1, January 2026 pp. 26-33

doi.org/10.47001/IRJIET/2026.101004

References

  1. M. Ozaif, S. Mustajab, and M. Alam, "Exploration of Secured Data Transmission in the Internet of Things: A Survey," Power and Communication, 2024. [Online] Available: [HTML]
  2. O. Layode, H. N. N. Naiho, and G. S. Adeleke, "Data Privacy and Security Challenges in Environmental Research: Approaches to Safeguarding Sensitive Information," Journal of Applied ..., 2024. [Online] Available: ResearchGate.net
  3. K. M. Hosny, M. A. Zaki, N. A. Lashin, and M. M. Fouda, "Multimedia Security Using Encryption: A Survey," IEEE, 2023. [Online] Available: IEEE.org
  4. O. A. Khashan, N. M. Khafajah, W. Alomoush, and M. Alshinwan, "Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-core Processors," Cryptography, 2023. [Online] Available: MDPI.com
  5. S. Yin, H. Li, L. Teng, A. A. Laghari, and V. V. Estrela, "Attribute-Based Multiparty Searchable Encryption Model for Privacy Protection of Text Data," Multimedia Tools and Applications, vol. 2024, Springer. [Online] Available: ResearchGate.net
  6. F. Mlika, W. Karoui, and L. B. Romdhane, "Blockchain Solutions for Trustworthy Decentralization in Social Networks," Computer Networks, 2024. [Online] Available: [HTML]
  7. R. Lal, A. Chhabra, and S. Singla, "Blockchain Technology: Revolutionizing Trust, Transparency, and Transaction Efficiency," International Conference on ..., 2024. [Online] Available: [HTML]
  8. E. I. Zafir, A. Akter, M. N. Islam, S. A. Hasib, and T. Islam, "Enhancing Security of Internet of Robotic Things: A Review of Recent Trends, Practices, and Recommendations with Encryption and Blockchain Techniques," Internet of Things, vol. 2024, Elsevier. [Online] Available: ScienceDirect.com
  9. M. Y. Shakor, M. I. Khaleel, M. Safran, and S. Alfarhood, "Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security," IEEE, 2024. [Online] Available: IEEE.org
  10. M. J. Mihaljević, M. Knežević, D. Urošević, L. Wang et al., "An Approach for Blockchain and Symmetric Keys Broadcast Encryption-Based Access Control in IoT," Symmetry, 2023. [Online] Available: MDPI.com
  11. M. A. Shawky, M. Usman, D. Flynn, and M. A. Imran, "Blockchain-Based Secret Key Extraction for Efficient and Secure Authentication in VANETs," Journal of Information, vol. XX, no. YY, pp. ZZ-ZZ, 2023. [Online] Available: ScienceDirect.com
  12. J. R. Henrichsen, "Understanding Nascent Newsroom Security and Safety Cultures: The Emergence of the 'Security Champion'," Journalism and Safety, 2024. [Online] Available: [HTML]
  13. K. Assmann, "Whistleblowers and Their Faith in Journalism," Journalism Practice, 2024. [Online] Available: [HTML]
  14. X. Gao, M. Huang, H. Luo, and Y. Xu, "A Homomorphic Encryption-Based Secure Chatting System," IEEE Access, vol. 8, pp. 132135–132144, 2020.
  15. J. Wu et al., "Medical SAM Adapter: Adapting Segment Anything Model for Medical Image Segmentation," arXiv:2304.12620, 2023.
  16. Roy et al., "SAM Fails in Medical Images," arXiv:2304.05396, 2023.
  17. S. M. Flatté, "Sound Transmission Through a Fluctuating Ocean," Stanford Research Institute, Tech. Rep. JSR-76-39, 1977.
  18. Y. Tang et al., "Video Understanding with Large Language Models: A Survey," arXiv:2312.17432, 2024.
  19. M. Maaz et al., "Video-ChatGPT: Detailed Video Understanding via Large Vision and Language Models," arXiv:2306.05424, 2023.
  20. X. Ma, Y. Jiang, and C. Lin, "A Blockchain-Based Digital Rights Management System for Multimedia Content," IEEE Trans. Multimedia, vol. 24, pp. 142–153, 2022.
  21. G. S. Aujla et al., "Blockchain-Based Multimedia Content Protection: Challenges and Future Directions," Multimedia Tools and Applications, vol. 79, pp. 31533–31558, 2020.