Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Image Authentication Scheme Using Merkle Tree Mechanisms

View through CrossRef
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.
Title: An Image Authentication Scheme Using Merkle Tree Mechanisms
Description:
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms.
Similarly , blockchain technology has also become very popular in recent years.
This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain.
The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features.
In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path.
In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images.
The main purpose of this paper is to achieve the goal of image integrity verification.
The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering.
Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources .
The verification method is performed by each node in the blockchain network.
The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.

Related Results

An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Data Integrity Verification Using MPT (Merkle Patricia Tree) in Cloud Computing
Data Integrity Verification Using MPT (Merkle Patricia Tree) in Cloud Computing
Data integrity of outsourced data is main problem in CSP (cloud service provider). Space overhead and computation complexity are very high issue in recent PDP(Provable Data Possess...
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-te...
Inter-specific variations in tree stem methane and nitrous oxide exchanges in a tropical rainforest
Inter-specific variations in tree stem methane and nitrous oxide exchanges in a tropical rainforest
<p>Tropical forests are the most productive terrestrial ecosystems, global centres of biodiversity and important participants in the global carbon and water cycles. T...
The Sensitivity Feature Analysis for Tree Species Based on Image Statistical Properties
The Sensitivity Feature Analysis for Tree Species Based on Image Statistical Properties
While the statistical properties of images are vital in forestry engineering, the usefulness of these properties in various forestry tasks may vary, and certain image properties mi...

Back to Top