An Image Authentication Scheme Using Merkle Tree Mechanisms

被引:16
|
作者
Chen, Yi-Cheng [1 ]
Chou, Yueh-Peng [1 ]
Chou, Yung-Chen [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn CSIE, 500 Liufeng Rd, Taichung 41354, Taiwan
来源
FUTURE INTERNET | 2019年 / 11卷 / 07期
关键词
image authentication; Merkle tree; hash function; blockchain; distributed storage;
D O I
10.3390/fi11070149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
    Yin, Xinming
    He, Junhui
    Guo, Yi
    Han, Dezhi
    Li, Kuan-Ching
    Castiglione, Arcangelo
    SENSORS, 2020, 20 (20) : 1 - 19
  • [2] An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid
    Li, Hongwei
    Lu, Rongxing
    Zhou, Liang
    Yang, Bo
    Shen, Xuemin
    IEEE SYSTEMS JOURNAL, 2014, 8 (02): : 655 - 663
  • [3] An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs
    Moni, Shafika Showkat
    Manivannan, D.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [4] Lightweight authentication scheme for smart grid using Merkle hash tree and lossless compression hybrid method
    Tohidi, Hamed
    Vakili, Vahid Tabataba
    IET COMMUNICATIONS, 2018, 12 (19) : 2478 - 2484
  • [5] A Design of Efficient Multi-Authentication Scheme Using a Merkle Hash Tree in the Smart Home Environments
    Kim, Mansik
    Choi, Won-Kyu
    Jun, Moon-Seog
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2538 - 2542
  • [6] Micropayment scheme based on Merkle tree
    Tan, Yunmeng
    Lang, Weimin
    Yang, Zongkai
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (06): : 27 - 28
  • [7] A New Broadcast Authentication Method Based on Merkle Tree
    Mang, Luqiao
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 787 - 791
  • [8] Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
    Tian Y.
    Luo Q.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 118 - 129
  • [9] Formulation of Information Hiding Model for One-Time Authentication Methods Using the Merkle Tree
    Suga, Yuji
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES, 2019, 29 : 363 - 373
  • [10] An Image Authentication Scheme Using Magic Square
    Chang, Chin-Chen
    The Duc Kieu
    Wang, Zhi-Hui
    Li, Ming-Chu
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 1 - +