An Image Authentication Scheme Using Merkle Tree Mechanisms

被引:16
|
作者
Chen, Yi-Cheng [1 ]
Chou, Yueh-Peng [1 ]
Chou, Yung-Chen [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn CSIE, 500 Liufeng Rd, Taichung 41354, Taiwan
来源
FUTURE INTERNET | 2019年 / 11卷 / 07期
关键词
image authentication; Merkle tree; hash function; blockchain; distributed storage;
D O I
10.3390/fi11070149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain
    Liu, Zhenpeng
    Ren, Lele
    Feng, Yongjiang
    Wang, Shuo
    Wei, Jianhang
    IEEE ACCESS, 2023, 11 : 59263 - 59273
  • [22] GMMT: A Revocable Group Merkle Multi-tree Signature Scheme
    Yehia, Mahmoud
    AlTawy, Riham
    Gulliver, T. Aaron
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 136 - 157
  • [23] Repairable image authentication scheme
    Chen, Yi-Hui
    Lin, Chih-Yang
    Sirakriengkrai, Wanutchaporn
    Weng, I-Chun
    International Journal of Network Security, 2015, 17 (04) : 439 - 444
  • [24] Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (11) : 5386 - 5393
  • [25] Optimized source authentication scheme for multicast using hybrid tree and chains
    Li, Yang
    Xu, Guoai
    Niu, Xinxin
    Yang, Yixian
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2011, 39 (07): : 50 - 53
  • [26] A digital watermarking scheme for personal image authentication using eigenface
    Chen, CH
    Chang, LW
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 3, PROCEEDINGS, 2004, 3333 : 410 - 417
  • [27] A Fragile Watermarking Scheme for Image Authentication Using Wavelet Transform
    Azeroual, Assma
    Afdel, Karim
    IMAGE AND SIGNAL PROCESSING (ICISP 2016), 2016, 9680 : 337 - 345
  • [28] A content based image watermarking scheme for authentication using quadtrees
    Parameswaran, Latha
    Anburnani, K.
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 146 - +
  • [29] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [30] Merkle Quad-Tree Based Remote Sensing Image Analysis
    Zhai, Weixin
    Qi, Kun
    Duan, Jiexiong
    Cheng, Chengqi
    2017 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2017, : 6193 - 6196