An Image Authentication Scheme Using Merkle Tree Mechanisms

被引:16
|
作者
Chen, Yi-Cheng [1 ]
Chou, Yueh-Peng [1 ]
Chou, Yung-Chen [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn CSIE, 500 Liufeng Rd, Taichung 41354, Taiwan
来源
FUTURE INTERNET | 2019年 / 11卷 / 07期
关键词
image authentication; Merkle tree; hash function; blockchain; distributed storage;
D O I
10.3390/fi11070149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Improved Reversible Image Authentication Scheme
    Yin, Zhaoxia
    Niu, Xuejing
    Zhou, Zhili
    Tang, Jin
    Luo, Bin
    COGNITIVE COMPUTATION, 2016, 8 (05) : 890 - 899
  • [42] A compression tolerant scheme for image authentication
    刘宝锋
    张文军
    余松煜
    Journal of Harbin Institute of Technology, 2004, (04) : 399 - 404
  • [43] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [44] Merkle Tree Traversal Revisited
    Buchmann, Johannes
    Dahmen, Erik
    Schneider, Michael
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 63 - 78
  • [45] Secure and Efficient Authentication in Wireless Mesh Networks using Merkle Trees
    Santhanam, Lakshmi
    Xie, Bin
    Agrawal, Dharma P.
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 941 - 947
  • [46] BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (04) : 1974 - 1983
  • [47] An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography
    Al-Shqeerat, Khalil Hamdi Ateyeh
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (03): : 2095 - 2107
  • [48] Novel watermarking scheme for image authentication using vector quantization approach
    Tiwari A.
    Sharma M.
    Radioelectronics and Communications Systems, 2017, 60 (04) : 161 - 172
  • [49] Image authentication scheme with discrimination of tampers on watermark or image
    Wang, Guo-Dong
    Liu, Fen-Lin
    Liu, Yuan
    Yao, Gang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (07): : 1349 - 1354
  • [50] Optical image authentication scheme using dual polarization decoding configuration
    Wang, Qu
    Xiong, Deping
    Alfalou, Ayman
    Brosseau, Christian
    OPTICS AND LASERS IN ENGINEERING, 2019, 112 : 151 - 161