EconPapers    
Economics at your fingertips  
 

An Image Authentication Scheme Using Merkle Tree Mechanisms

Yi-Cheng Chen, Yueh-Peng Chou and Yung-Chen Chou
Additional contact information
Yi-Cheng Chen: Department of Computer Science and Information Engineering (CSIE), Asia University, No. 500, Liufeng Road, Wufeng District, Taichung City 41354, Taiwan
Yueh-Peng Chou: Department of Computer Science and Information Engineering (CSIE), Asia University, No. 500, Liufeng Road, Wufeng District, Taichung City 41354, Taiwan
Yung-Chen Chou: Department of Computer Science and Information Engineering (CSIE), Asia University, No. 500, Liufeng Road, Wufeng District, Taichung City 41354, Taiwan

Future Internet, 2019, vol. 11, issue 7, 1-18

Abstract: Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.

Keywords: image authentication; Merkle tree; hash function; blockchain; distributed storage (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2019
References: View complete reference list from CitEc
Citations: View citations in EconPapers (4)

Downloads: (external link)
https://www.mdpi.com/1999-5903/11/7/149/pdf (application/pdf)
https://www.mdpi.com/1999-5903/11/7/149/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:11:y:2019:i:7:p:149-:d:246210

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:11:y:2019:i:7:p:149-:d:246210