An Image Authentication Scheme Using Merkle Tree Mechanisms

被引:16
|
作者
Chen, Yi-Cheng [1 ]
Chou, Yueh-Peng [1 ]
Chou, Yung-Chen [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn CSIE, 500 Liufeng Rd, Taichung 41354, Taiwan
来源
FUTURE INTERNET | 2019年 / 11卷 / 07期
关键词
image authentication; Merkle tree; hash function; blockchain; distributed storage;
D O I
10.3390/fi11070149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A robust image watermarking scheme using multiwavelet tree
    Kumsawat, Prayoth
    Attakitmongcol, Kitti
    Srikaew, Arthit
    WORLD CONGRESS ON ENGINEERING 2007, VOLS 1 AND 2, 2007, : 612 - +
  • [32] Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience
    Koo, Dongyoung
    Shin, Youngjoo
    Yun, Joobeom
    Hur, Junbeom
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [33] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [34] An image authentication scheme with localization and recovery
    Chuanmu, Li
    Lili, Liu
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 5, PROCEEDINGS, 2008, : 669 - 673
  • [35] A novel hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 486 - +
  • [36] Improved Reversible Image Authentication Scheme
    Zhaoxia Yin
    Xuejing Niu
    Zhili Zhou
    Jin Tang
    Bin Luo
    Cognitive Computation, 2016, 8 : 890 - 899
  • [37] A NEW SCHEME FOR IMAGE AUTHENTICATION FRAMEWORK
    Bausys, Romualdas
    Kriukovas, Arturas
    INFORMATION TECHNOLOGY AND CONTROL, 2008, 37 (04): : 294 - 300
  • [38] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [39] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [40] ‘Hop horse’ image authentication scheme
    Fouad, Mona A.
    Mansour, Ahmed Mokhtar A.
    International Journal of Multimedia and Ubiquitous Engineering, 2015, 10 (05): : 65 - 76