Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Future Internet  /  Vol: 11 Par: 7 (2019)  /  Artículo
ARTÍCULO
TITULO

An Image Authentication Scheme Using Merkle Tree Mechanisms

Yi-Cheng Chen    
Yueh-Peng Chou and Yung-Chen Chou    

Resumen

Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.

 Artículos similares

       
 
Xingang Zhang, Haowen Yan, Liming Zhang and Hao Wang    
Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information ... ver más

 
Blerim Rexha, Gresa Shala and Valon Xhafa    
Personal mobile devices currently have access to a significant portion of their user?s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing ac... ver más
Revista: Future Internet

 
Xiaoyan Yu, Chengyou Wang and Xiao Zhou    
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people?s attention. The fragile watermark for integrity authentica... ver más
Revista: Future Internet