Next Article in Journal
Pendulum Search Algorithm: An Optimization Algorithm Based on Simple Harmonic Motion and Its Application for a Vaccine Distribution Problem
Next Article in Special Issue
Time Series Analysis of Cryptocurrency Prices Using Long Short-Term Memory
Previous Article in Journal
A Cost-Efficient MCSA-Based Fault Diagnostic Framework for SCIM at Low-Load Conditions
Previous Article in Special Issue
A Survey on Network Optimization Techniques for Blockchain Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images

1
Jinling Institute of Technology, Nanjing 211169, China
2
Jiangsu AI Transportation Innovations & Applications Engineering Research Center, Nanjing 211169, China
3
CSIRO Data61, Sydney, NSW 1710, Australia
4
College of Civil Engineering, Nanjing Forestry University, Nanjing 210037, China
*
Authors to whom correspondence should be addressed.
Algorithms 2022, 15(6), 213; https://doi.org/10.3390/a15060213
Submission received: 8 May 2022 / Revised: 14 June 2022 / Accepted: 15 June 2022 / Published: 17 June 2022
(This article belongs to the Special Issue Advances in Blockchain Architecture and Consensus)

Abstract

:
Aiming at the deficiency that blockchain technology is too sensitive to the binary-level changes of high resolution remote sensing (HRRS) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains. To implement this subject-sensitive hashing algorithm, we designed and implemented a deep neural network model MultiRes-RCF (richer convolutional features) for extracting features from HRRS images. A MultiRes-RCF network is an improved RCF network that borrows the MultiRes mechanism of MultiResU-Net. The subject-sensitive hashing algorithm based on MultiRes-RCF can detect the subtle tampering of HRRS images while maintaining robustness to operations that do not change the content of the HRRS images. Experimental results show that our MultiRes-RCF-based subject-sensitive hashing algorithm has better tamper sensitivity than the existing deep learning models such as RCF, AAU-net, and Attention U-net, meeting the needs of HRRS image blockchains.

1. Introduction

As geographic information data, high resolution remote sensing (HRRS) images have the characteristics of rich information, high security, and rapid updating, which can provide a lot of valuable information for geoscience research. While HRRS images are widely used in urban planning, disaster relief, resource development, the military, and other fields [1,2,3], the integrity authentication of HRRS images is exposed. The rapid development of information and network technology has made the acquisition, transmission, and storage of HRRS images very convenient and frequent, but has also made the traditional technology-oriented authentication move towards a stand-alone mode, and is thus in trouble. The rise of blockchain technology provides new technical support for solving the problem of HRRS image authentication in a cloud network environment. Blockchains have been successfully applied to the protection of images [4,5] and videos [6], showing great application potential. In addition, some scholars have begun to apply blockchain technology to the sharing of remote sensing images [7,8].
However, the mainstream blockchain with the cryptographic hash function as the main technical means is too sensitive to data changes at the binary level and cannot fully meet the integrity authentication requirements of HRRS images. For example, after HRRS image format conversion (such as from TIFF format to PNG format), the content of the HRRS image has not changed. Still, its binary representation has undergone massive changes. In this case, the mainstream blockchain still believes that the HRRS image has been tampered with, which is obviously unreasonable. Subject-sensitive hashing can solve the above problems very well.
Subject-sensitive hashing [9] is a new type of hashing technology developed on the basis of perceptual hashing [10,11,12]. The main difference between subject-sensitive hashing and perceptual hashing is “subject sensitivity”. Subject-sensitive hashing retains the robustness of perceptual hashing and can perform stricter integrity authentication on the image content that users pay attention to. However, the existing subject-sensitive hashing for HRRS images focuses on the overall performance of the algorithm, while the subject-sensitive hashing used in the blockchain should be more sensitive to tampering than in the conventional environment, because the data on the blockchain are difficult to change after they are on the chain.
In this paper, based on the analysis of the blockchain’s demand for subject-sensitive hashing, we propose a subject-sensitive hashing algorithm specially used for HRRS image blockchains, which overcomes the deficiency that mainstream blockchain technologies can only perform a binary-level authentication for HRRS images. The contributions of this paper can be summarized as follows:
(1)
We provide an in-depth analysis of the requirements for blockchain-oriented subject-sensitive hashing.
(2)
We refine the improved blockchain model based on subject-sensitive hashing for HRRS images.
(3)
We propose a new deep neural network MultiRes-RCF for extracting subject-sensitive features of HRRS images and implement a subject-sensitive hashing algorithm based on MultiRes-RCF.
The rest of the paper is composed as follows: The related works are described in Section 2. Section 3 discusses the details of our proposed method. The details of the experiments and discussion are presented in Section 4, and the conclusions are drawn in Section 5.

2. Preliminaries

2.1. Blockchain

A blockchain [13] is a chain structure with data blocks as the basic unit. Blockchains were initially used in the field of digital currency and later expanded to many industries such as the Internet of Things [14,15], supply chain management [16,17], medical care [18], education [19] and e-commerce [20]. Essentially, a blockchain is a decentralized database: instead of just one master database storing the blockchain’s data, multiple copies of the same blockchain data are distributed across a peer-to-peer network. In a blockchain, data are stored on the chain in the form of blocks. Each block is connected in chronological order and is mainly composed of a block header containing metadata and a block body containing the specific block data stored in this block [21]. The implementation process of a blockchain integrates various technologies such as cryptography and distributed systems to build a distributed environment, in which transactions can be performed safely without mutual trust and solves the problems of data storage security that may be caused by central institutions. With the in-depth development of blockchain technology, it has also been initially developed and applied in remote sensing [7,8]. The immutability guarantees the integrity of the on-chain HRRS image to a large extent.
However, there are still many deficiencies in the authentication technology of a HRRS images’ blockchain. The outstanding problem is that the blockchain is too sensitive to changes in the content of HRRS images. For example, after the format conversion of the HRRS image on the chain, although the image has changed a lot at the binary level, its effective content has not changed significantly. In fact, the users of HRRS images are more concerned about whether the effective content of the HRRS images has been tampered with, rather than whether the carrier of the content has changed. The root of the above problem is that the blockchain uses a cryptographic hash function (SHA-1 or SHA-256) to generate the digital digest of the HRRS image, which can be solved by subject-sensitive hashing.

2.2. Subject-Sensitive Hashing

Subject-sensitive hashing [9], also known as the subject-sensitive hash algorithm, is a new hashing technology based on perceptual hashing. Subject-sensitive hashing focuses the goal of integrity authentication on the types of features that users are interested in. It overcomes the insufficiency of perceptual hashing and can achieve “customized” integrity authentication according to the actual needs of the users. A subject-sensitive hashing algorithm generally includes the following steps: subject-sensitive feature extraction, feature quantization, and feature encoding. In the above steps, subject-sensitive feature extraction focuses on extracting the type of information that users pay attention to, taking into account other types of feature information; feature quantization is conducted to remove the redundancy of the extracted features; and feature encoding is performed to compress and encrypt the quantized features to obtain a subject-sensitive hash sequence. Among them, feature extraction is the key step.
The existing subject-sensitive hashing algorithms for HRRS images are mainly implemented based on deep learning. In [9], a deep neural network model MUM-Net for subject-sensitive hashing is proposed. The subject-sensitive hash algorithm based on MUM-Net has good robustness and tamper sensitivity, but the model has high computational complexity. In [22], a lightweight deep neural network Semi-U-net is proposed, which overcomes the shortcomings of MUM-Net’s low computational efficiency and overly complex model. In [23], a deep neural network model AAU-Net based on the Attention mechanism was proposed, which significantly enhanced the distinction between “subject-related tampering” and “subject-unrelated tampering”.
Different subject-sensitive hashing algorithms often have significant differences in specific properties. For example, the Attention ResU-Net-based subject-sensitive hashing algorithm has good robustness, but its tamper sensitivity is not good, making it unsuitable for HRRS image integrity authentication [23]. This means that the specific subject-sensitive hashing algorithm implementation process should be determined according to the application requirements of the algorithm.
However, to the best of our knowledge, there is no research on subject-sensitive hashing algorithms specifically for blockchains. We believe that subject-sensitive hashing algorithms for blockchains should meet the following requirements:
(1)
Since the authentication information of HRRS images cannot be modified once it is uploaded to the chain, the subject-sensitive hashing algorithm should be as sensitive as possible to the feature information on multi-level scales to satisfy the later integrity authentication in various environments.
(2)
Due to the difference in cost sensitivity, undetected tampering often causes more harm to HRRS images. Therefore, the subject-sensitive hashing algorithm used in blockchains should have good tamper sensitivity, and slight tampering of HRRS images should be detected, especially tampering of changing only a few pixels, which is not usually considered tampering in some other applications.
(3)
The scope of maintaining robustness should not be broad, i.e., it can only maintain robustness for operations that do not affect the later application of HRRS images, such as format conversion and copyright watermark embedding.
Based on the aforementioned considerations, we designed a blockchain-oriented subject-sensitive hashing algorithm in this paper.

3. The Proposed Method

Aiming at the problem that blockchains are too sensitive to image changes in HRRS image authentication, we refined the improved blockchain for HRRS image authentication based on subject-sensitive hashing and propose a subject-sensitive hashing algorithm specifically for this improved blockchain.

3.1. Structure of the Improved Blockchain Based on Subject-Sensitive Hashing

The structure of the improved blockchain is shown in Figure 1. The most obvious improvement is using two kinds of hashing methods, subject-sensitive hashing and SHA-1, instead of just a cryptographic hash function. The subject-sensitive hashing is used to calculate the digital digest of the HRRS image, that is, the subject-sensitive hash sequence; SHA-1 is used to ensure the security of the blockchain. Furthermore, we propose a subject-sensitive hashing algorithm dedicated to this method, which will be discussed in detail in Section 3.2.
As shown in Figure 1, the structure of the block header of the improved blockchain is the same as that of the conventional blockchain, but the block body has specific differences. The block header contains the following information:
(1)
The root hash is the hash value of the block body. If there is only one HRRS image, the root hash can use a subject-sensitive hash sequence instead of compressing multiple subject-sensitive hash sequences with SHA-1.
(2)
The previous block hash is the hash sequence of the previous block header, which is calculated by SHA-1 to ensure the security of the blockchain itself.
(3)
Other information in the block header includes additional information such as timestamps and the version number.
In the block body, the hash sequence of each HRRS image is calculated by subject-sensitive hashing instead of a cryptographic hash. After the subject-sensitive hash sequence of the HRRS image is compressed by SHA-1 (other cryptographic hash functions can also be used), the final hash value obtained is used as the root hash of the block header.

3.2. MultiRes-RCF-Based Subject-Sensitive Hashing for HRRS Images

As discussed in Section 2.1, the subject-sensitive hashing algorithm is characterized by a relatively high tamper sensitivity. We propose a subject-sensitive hashing algorithm specifically for blockchains.
The key to the subject-sensitive hashing algorithm is the deep neural network model used by the algorithm [9,23]; the extraction method of the subject-sensitive features based on the deep neural network not only reduces the complexity of the feature design, but can also mine the hidden essential information of the HRRS images, laying the foundation for the integrity authentication of the HRRS images. According to the algorithm requirements, the existing subject-sensitive hashing algorithms of the HRRS images use different deep neural networks. Since various deep neural networks often determine different performances of algorithms, the existing subject-sensitive hashing algorithms of HRRS images use different deep neural networks according to the algorithm requirements. Our algorithm faces the application environment of the HRRS image blockchain and has to have better tamper sensitivity. Therefore, we propose a deep neural network named MultiRes-RCF that can extract multi-scale HRRS image features to meet the algorithm’s sensitivity to tampering.

3.2.1. Network Architecture of MultiRes-RCF

Scale is an important feature of HRRS images. It generally refers to the relative size of the spatial range and the relative length of time expressed by the data. In the analysis and use of HRRS images, there are obvious scale differences in identifying different ground objects [24,25]. As the same type of features may have different descriptions at different scales, feature extraction at a single scale cannot satisfy all analyses and applications, while multi-scale analysis methods can form a feature set with a hierarchical structure and can obtain more accurate and objective information. The subject-sensitive hash algorithm based on a multi-scale strategy can not only enhance the tamper sensitivity of the algorithm, but also expand the application scope of the authentication algorithm.
However, it is difficult to predict at which scale the content of HRRS images can be better detected in most cases. We believe that blockchain-oriented subject-sensitive hashing should be able to detect and identify objects of different scales. On the basis of richer convolutional features (RCF) [26], we propose a network named MultiRes-RCF (richer convolutional features). MultiRes-RCF is based on the MultiRes mechanism [27] to improve the performance of the RCF network to extract multi-scale features of HRRS images.
A neat contribution of the RCF architecture is to fully utilize the CNN features from all convolutional layers, making good use of the rich feature hierarchy. The network structure of RCF is built based on the VGG16, and all the fully connected layers and the fifth pooling layer of VGG16 are removed. RCF divide the convolution into five stages, and the pooling layers downsample the two adjacent stages. This enables RCF to automatically combine complementary information from all layers of the CNN to obtain accurate representations of the objects. However, the 3 × 3 convolutional layers used by RCF do not have many advantages in extracting multi-scale features. Moreover, as the width and depth of deep neural networks increase, they face the problem of network degradation caused by vanishing gradients or exploding gradients. In MultiResU-Net [27], the sequence of two convolutional layers of the original U-Net [28] is replaced by MultiRes blocks to solve the problem of different scales of images.
As shown in Figure 2, a series of 3 × 3 convolution kernels are used in the MultiRes block to simulate the receptive fields of 5 × 5 convolution kernels and 7 × 7 convolution kernels. At the same time, the input of these convolution kernels is directly superimposed with the output of these convolution kernels through the residual path after 1 × 1 convolution. This can not only extract image features of different scales but can also reduce the amount of network computation. After all, it is very computationally expensive to directly use 5 × 5 convolution kernels and 7 × 7 convolution kernels to extract multi-scale features.
Our proposed MultiRes-RCF is based on MultiRes blocks to improve the RCF and enhance its ability to extract multi-scale features without significantly increasing the scale and computational complexity of the model.
As shown in Figure 3, the network input size of MultiRes-RCF is 256 × 256 pixels. MultiRes-RCF consists of 4 stages—1 stage less than the original RCF. This is because each stage of RCF contains 2 or 3 3 × 3 convolution kernels, while each stage of MultiRes-RCF contains 2 MultiRes blocks, implementing 3 × 3, 5 × 5, and 7 × 7 convolution operations to merge in parallel. Except for the output layer, the activation function of all the convolutional layers in this network is the ReLU (Rectified Linear Unit), and each convolutional layer is batch normalized.
The improved blockchain based on subject-sensitive hashing needs to train the deep neural network model used for feature extraction, which is a significant difference between our method and mainstream blockchains. The training process and training dataset of MultiRes-RCF will be discussed in Section 4.1.

3.2.2. The Flow of the Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF

The flow of our subject-sensitive hashing algorithm is shown in Figure 4. Before the feature extraction based on MultiRes-RCF, the HRRS image needs to be preprocessed to make it meet the input conditions of MultiRes-RCF; the output of MultiRes-RCF is then compressed and encoded to obtain a subject-sensitive hash sequence.
In the process of feature compression, we adopted the principal component analysis (PCA)-based compression method and took the principal components of the feature matrix as the compressed feature, which is similar to the existing subject-sensitive hashing [9,23]. The encoding process of the features takes the binary high-order part of the principal component value and fills the insufficient parts with zeros. The encoded hash sequence is in binary form and can also be represented as hexadecimal, which is easier to store.
To ensure the security of the hash sequence itself, the hash sequence can also be encrypted, which is a commonly used security enhancement method for subject-sensitive hashing algorithms. However, in our subject-sensitive hashing algorithm, the process of encrypting the hash sequence is not adopted, because the blockchain mechanism can already guarantee its security and the additional encryption process increases the burden of key management. This is also a feature that distinguishes our algorithm from other subject-sensitive hashings.

3.3. The Authentication Process of HRRS Images Based on this Method

The authentication process of our improved blockchain differs significantly from mainstream blockchains: the authentication process based on our method does not require that the hash sequence of the HRRS image to be authenticated is the same as the on-chain subject-sensitive hash sequence, as only the difference between the two is required to be lower than the set threshold T.
The hamming distance can measure the number of changed characters between two string sequences. However, the length of the subject-sensitive hash sequences may vary with the change in the algorithm parameters. We used the “normalized Hamming distance” to measure the difference between two subject-sensitive hash sequences as shown below, where h1 and h2 are subject-sensitive hash sequences of length L.
D i s = ( i = 1 L | h 1 ( i ) h 2 ( i ) | ) / L
This threshold-based integrity authentication process is more flexible than the traditional blockchain that uses the cryptographic hash function to calculate the image hash value directly. It overcomes some deficiencies caused by the “immutability” of traditional blockchains: after the HRRS image on the chain undergoes operations such as format conversion and watermark embedding, as long as the change in the subject-sensitive hash sequences is lower than the pre-set threshold T, we consider that the content of the HRRS image has not changed, regardless of whether the HRRS image has changed at the binary level. The integrity authentication process can be adjusted by setting different thresholds T, unlike traditional blockchains in which users have no intervention in the authentication process.

4. Experiments and Discussion

In this section, we will verify the effectiveness of our proposed method through experiments but have no intention to develop a complete blockchain system. We implemented a simple blockchain simulator in Python 3.7.5 and compared our method with the following two methods:
(1)
The blockchain authentication method based entirely on cryptography. This class of methods uses a cryptographic hash function in computing the hash sequence of the HRRS images, and other steps are the same as our method. In the experiments in this paper, we chose MD5 and SHA-1 as the comparison methods, respectively.
(2)
The improved blockchain based on other existing subject-sensitive hashing algorithms. These methods are also improved blockchains based on subject-sensitive hashing algorithms but are based on other deep neural networks. In this experiment, we chose the RCF [26] -based algorithm, MultiResU-Net [27] -based algorithm, Attention U-Net [29] -based algorithm, and AAU-Net [23] -based algorithm as the comparison method.
To focus the experimental comparison on the core improvement of our method, the blockchains based on each comparison hash algorithm only used different hash algorithms in the process of calculating the hash sequence of the HRRS image; the other steps were entirely the same, and the programming language was Python 3.7.5.

4.1. Performance Evaluation Metrics and Experimental Settings

4.1.1. Performance Evaluation Metrics

The specific environment of the blockchain determines that the requirements of the subject-sensitive hashing algorithm specifically for blockchains are different from other subject-sensitive hashing algorithms, as analyzed in Section 2.1. In the experiments, we will evaluate our method and the comparison methods from the following two points:
(1)
For operations that do not change the content of the HRRS images, such as image format conversion and copyright watermark embedding, keep them as robust as possible. The robustness evaluation index is defined as:
R = N u m R N u m T o t a l
where N u m T o t a l represents the total number of images for robustness testing and N u m R represents the number of images whose hash sequence variation is lower than the preset threshold T.
(2)
Regarding the tamper sensitivity, even pixel-level content changes should be detected as much as possible. The tamper sensitivity index is defined as:
S = N u m S N u m T o t a l
where N u m S represents the number of tampered HRRS images detected under the threshold T.

4.1.2. Training Process and Training Dataset of MultiRes-RCF

In the experiments, we implemented our proposed Multi-RCF network using Keras (Tensorflow as the backend) on a GPU workstation equipped with NVIDIA RTX 2080Ti GPU (11 G memory and 4352 cores) and an Intel i7-9700K CPU. The training process of each models adopted the same dataset as [9,23]. This dataset combines the existing WHU building dataset [30] and the method of manually drawing robust edge images, including a total of 3166 pairs of training samples. The construction of this training dataset can be divided into two steps: First, modify the WHU building dataset to meet the needs of our model; then, draw the training samples manually with the false edges removed.
As edge pixels occupy a small proportion in the training samples, an α-balanced variant of focal loss [31] was taken as the activation function of MultiRes-RCF. Due to the limitation of the GPU memory size, the batch size was set to four, and the epochs was set to 100 during the training of the model. As shown in Figure 5, the training loss curve distribution and the validation loss after each epoch are plotted.
We took the following three evaluation metrics to compare the complexity of each model: the number of parameters, the size of the storage space consumed, and the Floating Point Operations Per Second (FLOPs). The results are shown in Table 1:
As can be seen from the table above, our MultiRes-RCF significantly reduced the number of parameters, storage size, and FLOPs compared to the existing models, and had certain potential advantages in further lightweighting.

4.2. Comparative Example of Integrity Authentication

To more intuitively illustrate the difference between our improved method and traditional blockchains, we chose the HRRS image shown in Figure 6a as an example to present. In Figure 6, Figure 6a is the original HRRS image in TIFF format; Figure 6b,c are the images after format conversion (TIFF format to PNG format) and watermark embedding (embedding 32-bit watermark information). The contents of the HRRS images of Figure 6b,c have not changed but the two images have changed greatly at the binary level. Figure 6d,e are the tampered HRRS images, respectively, and the contents and binary-level representations of these two tampered images have changed greatly.
The hash sequences generated by each comparison algorithm for each HRRS image in Figure 6 are shown in Table 2. The normalized Hamming distance of each subject-sensitive hash algorithm in Table 2 after each operation on the HRRS images is shown in Table 3. In Table 3, there is no normalized Hamming distance of the cryptographic hash function; this is because the normalized Hamming distance between the hash sequences obtained by the cryptographic hash function has no practical significance while the subject-sensitive hashing algorithm judges whether the image has changed according to the normalized Hamming distance between the hash sequences.
According to the experimental results in Table 2 and Table 3, we can obtain the integrity authentication results of each comparison algorithm when the threshold T is set to 0.02, as shown in Table 4.
It can be seen from Table 4 that the cryptographic Hash functions represented by MD5 and SHA1 take operations such as format conversion and digital watermarking that do not change the image content as tampering, which is not suitable for the blockchain of HRRS images. The four subject-sensitive hashing algorithms based on different deep neural networks can maintain good robustness to operations that do not change the image content and detect operations that change the image content simultaneously, which overcomes the inadequacy of the cryptographic hash function in the blockchain of HRRS images.
The above experimental results show that the improved blockchain based on subject-sensitive hashing is more suitable for the integrity authentication of HRRS images than the traditional blockchain. Next, we will prove that our proposed MultiRes-RCF is more suitable for the blockchain of HRRS images.

4.3. Performance Analysis

Since our improved blockchain differs from mainstream blockchains by using a subject-sensitive hashing algorithm when computing the hash sequence of HRRS images, we next focus on evaluating the performance of our MultiRes-RCF-based subject-sensitive hashing algorithm.

4.3.1. Robustness Test

Robustness is the most obvious difference between subject-sensitive hashing and cryptographic hashing. Unlike applications of deep neural networks such as image recognition and image segmentation, subject-sensitive hashing requires a large amount of data to be tested to make the results more convincing and reliable. We adopted the dataset Datasets10,000 in [23] to test the robustness of each algorithm. This dataset contains 10,000 HRRS images of 256 × 256 pixels stored in TIFF format, consisting of Gaofen-2 (GF-2) satellite, DOTA [32], and some test images from [9,22].
First, we tested the robustness of each algorithm to format conversion. Here, we converted the images in TIFF format in Datasets10,000 to PNG format without data compression and then compared the normalized Hamming distance between the hash sequences before and after the format conversion. Under different thresholds T, the robustness test results of each algorithm are shown in Table 5:
It can be seen from Table 5 that due to the image of avalanche effect, the two cryptographic hash functions MD5 and SHA1 were not robust to format conversion, i.e., the HRRS images before and after format conversion were regarded as two different images by MD5 and SHA1, which is obviously not conducive to the integrity authentication of HRRS images. All the subject-sensitive hash algorithms involved in the test had a better robustness-to-format conversion.
Next, we tested the robustness of each algorithm to digital watermark embedding. In watermark embedding, 24-bit watermark information is embedded in a single band of the image, and the other bands remain unchanged. The watermark information of each bit is embedded in the second most significant bit of the pixel. The robustness test results after watermark embedding are shown in Table 6:
It can be seen from Table 6 that each subject-sensitive hashing algorithm had better robustness to digital watermark embedding. For example, for the MultiRes-RCF-based method, if the threshold T is set to 0.02, 99.9% of HRRS images can pass the integrity authentication after watermark embedding, i.e., the normalized Hamming distance of the hash sequence before and after the watermark embedding is lower than 0.02. If the threshold T is set to a value of 0.03 or greater, all HRRS images can pass the integrity authentication after embedding the watermark.

4.3.2. Tamper Sensitivity Test

Better tamper sensitivity is an important feature of blockchain-oriented subject-sensitive hashing algorithms, especially for detecting subtle tampering in HRRS images.
First, we tested the tampering sensitivity of each algorithm based on Datasets10,000: each HRRS image was tampered at random positions, and the size of the tampered area was 16 × 16 pixels, which can simulate subtle tampering of the HRRS image as much as possible. We used the ratio of tampering detected by each algorithm under different thresholds to represent the tampering sensitivity, and the results are shown in Table 7.
It can be seen from Table 7 that although the tamper sensitivity of each subject-sensitive hash algorithm could be compared with the cryptographic hash algorithms, the tamper sensitivity of the subject-sensitive hashing algorithm based on MultiRes-RCF was better than the other subject-sensitive hash algorithms.
Next, we tested the tamper sensitivity of each algorithm to pixel-level modifications. Additionally, based on the Datasets10,000 dataset, we constructed a tampered dataset: we randomly selected 16-pixel positions of the HRRS image and set the pixels of the three bands in this position to 0. This kind of subtle tampering is not easy to be detected by the human eye, but it can change the feature information carried by HRRS images. The ratio of the tampered images detected is also used to describe the tamper sensitivity of the algorithm, and the results are shown in Table 8:
It can be seen from Table 8 that the tamper sensitivity of the subject-sensitive hashing algorithm based on the MultiRes-RCF we proposed is still the best, and it can detect these pixel-level tampering well. Of course, there is still a gap compared with the cryptographic hash algorithms.
Subject-sensitive hashing is a special case of perceptual hashing, distinguished by its sensitivity to a particular subject. We adopted the dataset Datasets400 in [23] to test the tamper sensitivity of each algorithm to subject-unrelated tampering. This dataset contains 400 instances of tampering. Since Datasets400 takes buildings as the subject, the tampering in this dataset does not affect the building information but tampers with trees, grasses, and lakes. The tamper sensitivity test results on Datasets400 are shown in Table 9:
It can be seen from Table 9 that the tampering detection ability of the MultiRes-RCF-based method to the unrelated subject is roughly equivalent to the AAU-Net-based method and the Attention U-Net-based method, and even better when the threshold T is small.

4.4. Discussion

Blockchain-oriented subject-sensitive hashing should emphasize tamper sensitivity, especially to maintain tamper sensitivity for subtle tampering at the pixel level, which is different from existing subject-sensitive hashing algorithms. At the same time, it should maintain robustness to operations that do not affect users at all, which is different from traditional blockchains.
We propose a subject-sensitive hashing algorithm based on MultiRes-RCF, which borrows the MultiRes mechanism of MultiResU-Net to improve the RCF network. Through the experiments in this paper, we can draw the following conclusions:
(1)
Tamper Sensitivity.
From Table 6 to Table 8, the tamper sensitivity of the subject-sensitive hash algorithm based on MultiRes-RCF is better than that of other subject-sensitive hashing algorithms. Of course, the tamper sensitivity of subject-sensitive hashing algorithms is not as good as cryptographic hashing. After all, subject-sensitive hashing algorithms do not perform binary-level integrity authentication, and it will not be considered that the image has been tampered just because one bit of the image has changed.
(2)
Robustness.
The MultiRes-RCF-based subject-sensitive hashing algorithm can maintain a good robustness to operations such as format conversion and digital watermark embedding that do not affect the user’s use. It has no advantages over the existing subject-sensitive hashing algorithms but still overcomes the lack of robustness of the cryptographic hashing algorithms. Robustness is also an advantage of our improved blockchain over the existing blockchains entirely based on cryptography.
As subject-sensitive hashing needs to measure the degree of change in the image content, instead of only detecting whether the image has changed, the hash sequence length of subject-sensitive hashing is not as immutable as the cryptographic hash algorithm function. If the feature compression and encoding process of the algorithm is modified, a longer hash sequence can be obtained.
Overall, the overall performance of our proposed MultiRes-RCF-based subject-sensitive hashing algorithm is more suitable for HRRS image blockchains than for existing algorithms.

5. Conclusions

In this study, we propose a subject-sensitive hashing algorithm for HRRS image blockchains, which overcomes the deficiency that mainstream blockchain technologies can only perform binary-level authentication for HRRS images. The key to this subject-sensitive hashing algorithm lies in the MultiRes-RCF network, which is constructed by improving the RCF network by borrowing the MultiRes mechanism of MultiResU-Net. Compared with the existing algorithms, our MultiRes-RCF-based subject-sensitive hashing algorithm has stronger tamper sensitivity. It maintains good robustness to operations that do not change the HRRS image content.
The next research focus of this research is to study the subject-sensitive hash algorithm from the perspective of a lightweight model and low power consumption.

Author Contributions

All authors made a valuable contribution to this paper. K.D. and S.C. conceived, researched, and wrote the paper; Y.L. contributed research framing, ideas, and context; J.Y. and J.Z. participated in collecting and collating the experimental data. All authors have read and agreed to the published version of the manuscript.

Funding

This study was patricianly supported by grants from (a) China’s National Natural Science Foundation (Grant Nos. 41801303, 61902163, and 42101430) and (b) Funds for the Nanjing City Sci-Tech Innovation Team of Smart Transportation and Vehicle-Road Collaboration.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors thank the anonymous referees for their constructive comments, which improved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zakeri, F.; Mariethoz, G. A review of geostatistical simulation models applied to satellite remote sensing: Methods and appli-cations. Remote Sens. Environ. 2021, 259, 112381. [Google Scholar] [CrossRef]
  2. Chen, T.; Lu, Z.; Yang, Y.; Du, B.; Plaza, A. A Siamese Network Based U-Net for Change Detection in High Resolution Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2022, 15, 2357–2369. [Google Scholar] [CrossRef]
  3. Feng, L.; Chen, S.S.; Zhang, C.; Zhang, Y.Z.; He, Y. A comprehensive review on recent applications of unmanned aerial vehicle remote sensing with various sensors for high-throughput plant phenotyping. Comput. Electron. 2021, 182, 106033. [Google Scholar] [CrossRef]
  4. Li, R.P. Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed. Tools Appl. 2021, 80, 30583–30603. [Google Scholar] [CrossRef]
  5. Kumar, R.; Wang, W.Y.; Kumar, J.; Yang, T.; Khan, A.; Ali, W.; Ali, I. An Integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals. Comput. Med. Imaging Graph. 2021, 87, 101812. [Google Scholar] [CrossRef]
  6. Alizadeh, M.; Andersson, K.; Schelén, O. DHT- and blockchain-based smart identification for video conferencing. Blockchain Res. Appl. 2022, 3, 100066. [Google Scholar] [CrossRef]
  7. Zhang, L.; Gao, Y.H.; Chen, J.Y.; Wang, X.H.; Huang, Z.Y.; Wei, D. Research on remote sensing data sharing model based on blockchain technology. In Proceedings of the 2019 2nd International Conference on Blockchain Technology and Applications (ICBTA 2019), Xi’an, China, 9–11 December 2019. [Google Scholar]
  8. Pincheira, M.; Donini, E.; Giaffreda, R.; Vecchio, M. A Blockchain-Based Approach to Enable Remote Sensing Trusted Data. In Proceedings of the 2020 IEEE Latin American GRSS & ISPRS Remote Sensing Conference (LAGIRS), Santiago, Chile, 22–26 March 2020. [Google Scholar]
  9. Ding, K.; Liu, Y.; Xu, Q.; Lu, F. A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images. ISPRS Int. J. Geo-Inf. 2020, 9, 485. [Google Scholar] [CrossRef]
  10. Niu, X.M.; Jiao, Y.H. An Overview of Perceptual Hashing. Acta Electron. Sin. 2008, 36, 1405–1411. [Google Scholar]
  11. Yang, H.; Yin, J.; Jiang, M. Perceptual Image Hashing Using Latent Low-Rank Representation and Uniform LBP. Appl. Sci. 2018, 8, 317. [Google Scholar] [CrossRef] [Green Version]
  12. Du, L.; Ho, A.T.S.; Cong, R. Perceptual hashing for image authentication: A survey. Signal Process. Image Commun. 2020, 81, 115713. [Google Scholar] [CrossRef]
  13. Nakamoto, S. A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 10 April 2021).
  14. Zhai, P.; He, J.; Zhu, N. Blockchain-Based Internet of Things Access Control Technology in Intelligent Manufacturing. Appl. Sci. 2022, 12, 3692. [Google Scholar] [CrossRef]
  15. Meidute-Kavaliauskiene, I.; Yazdi, A.K.; Mehdiabadi, A. Integration of Blockchain Technology and Prioritization of Deploy-ment Barriers in the Blood Supply Chain. Logistics 2022, 6, 21. [Google Scholar] [CrossRef]
  16. Li, Z.-P.; Ceong, H.-T.; Lee, S.-J. The Effect of Blockchain Operation Capabilities on Competitive Performance in Supply Chain Management. Sustainability 2021, 13, 12078. [Google Scholar] [CrossRef]
  17. Venkatraman, S.; Parvin, S. Developing an IoT Identity Management System Using Blockchain. Systems 2022, 10, 39. [Google Scholar] [CrossRef]
  18. Butt, G.Q.; Sayed, T.A.; Riaz, R.; Rizvi, S.S.; Paul, A. Secure Healthcare Record Sharing Mechanism with Blockchain. Appl. Sci. 2022, 12, 2307. [Google Scholar] [CrossRef]
  19. Chivu, R.-G.; Popa, I.-C.; Orzan, M.-C.; Marinescu, C.; Florescu, M.S.; Orzan, A.-O. The Role of Blockchain Technologies in the Sustainable Development of Students’ Learning Process. Sustainability 2022, 14, 1406. [Google Scholar] [CrossRef]
  20. Xiao, Y.; Zhou, C.; Guo, X.; Song, Y.; Chen, C. A Novel Decentralized E-Commerce Transaction System Based on Blockchain. Appl. Sci. 2022, 12, 5770. [Google Scholar] [CrossRef]
  21. Yunianto, E.; Prayudi, Y.; Sugiantoro, B. B-DEC: Digital evidence cabinet based on blockchain for evidence management. Int. J. Comput. Appl. 2019, 181, 22–29. [Google Scholar] [CrossRef]
  22. Ding, K.M.; Su, S.B.; Xu, N.; Jiang, T.T. Semi-U-Net: A Lightweight Deep Neural Network for Subject-Sensitive Hashing of HRRS Images. IEEE Access 2021, 9, 60280–60295. [Google Scholar] [CrossRef]
  23. Ding, K.M.; Chen, S.B.; Wang, Y.; Liu, Y.M.; Zeng, Y.; Tian, J. AAU-Net: Attention-Based Asymmetric U-Net for Sub-ject-Sensitive Hashing of Remote Sensing Images. Remote Sens. 2021, 13, 5109. [Google Scholar] [CrossRef]
  24. Liu, J.; Yang, D.; Hu, F. Multiscale Object Detection in Remote Sensing Images Combined with Multi-Receptive-Field Features and Relation-Connected Attention. Remote Sens. 2022, 14, 427. [Google Scholar] [CrossRef]
  25. Zheng, Y.; Yang, M.; Wang, M.; Qian, X.; Yang, R.; Zhang, X.; Dong, W. Semi-Supervised Adversarial Semantic Segmentation Network Using Transformer and Multiscale Convolution for High-Resolution Remote Sensing Imagery. Remote Sens. 2022, 14, 1786. [Google Scholar] [CrossRef]
  26. Liu, Y.; Cheng, M.M.; Hu, X.W.; Bian, J.W.; Zhang, L.; Bai, X.; Tang, J.H. Richer Convolutional Features for Edge Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2019, 41, 1939–1946. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Ibtehaz, N.; Rahman, M.S. MultiResUNet: Rethinking the U-Net architecture for multimodal biomedical image segmentation. Neural Netw. 2020, 121, 74–87. [Google Scholar] [CrossRef]
  28. Ronneberger, O.; Fischer, P.; Brox, T. U-net: Convolutional networks for biomedical image segmentation. In Proceedings of the 18th International Conference on Medical Image Computing and Computer-Assisted Intervention, Munich, Germany, 5–9 October 2015; pp. 234–241. [Google Scholar]
  29. Oktay, O.; Schlemper, J.; Folgoc, L.L.; Lee, M.; Heinrich, M.; Misawa, K.; Mori, K.; McDonagh, S.; Hammerla, N.Y.; Kainz, B.; et al. Attention u-net: Learning where to look for the pancreas. arXiv 2018, arXiv:1804.03999. [Google Scholar]
  30. Ji, S.P.; Wei, S.Y. Building extraction via convolutional neural networks from an open remote sensing building dataset. Acta Geod. Cartogr. Sin. 2019, 48, 448–459. [Google Scholar]
  31. Lin, T.; Goyal, P.; Girshick, R.; He, K.; Dollár, P. Focal Loss for Dense Object Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 42, 318–327. [Google Scholar] [CrossRef] [Green Version]
  32. Xia, G.S.; Bai, X.; Ding, J.; Zhu, Z.; Belongie, S.; Luo, J.; Zhang, L. DOTA: A large-scale dataset for object detection in aerial images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA, 18–22 June 2018; pp. 3974–3983. [Google Scholar]
Figure 1. The structure of the improved blockchain for HRRS image.
Figure 1. The structure of the improved blockchain for HRRS image.
Algorithms 15 00213 g001
Figure 2. The structure of MultiRes blocks.
Figure 2. The structure of MultiRes blocks.
Algorithms 15 00213 g002
Figure 3. The structure of our proposed MultiRes-RCF networks.
Figure 3. The structure of our proposed MultiRes-RCF networks.
Algorithms 15 00213 g003
Figure 4. The structure of the proposed MultiRes-RCF networks (without encryption).
Figure 4. The structure of the proposed MultiRes-RCF networks (without encryption).
Algorithms 15 00213 g004
Figure 5. Loss and accuracy of Multi-RCF during training process.
Figure 5. Loss and accuracy of Multi-RCF during training process.
Algorithms 15 00213 g005
Figure 6. Examples of authentication for HRRS image: (a) Original TIFF format; (b) PNG format (TIFF format to PNG format); (c) watermark embedding (32 bits embedded in single band); (d) Tampering Example 1; (e) Tampering Example 2.
Figure 6. Examples of authentication for HRRS image: (a) Original TIFF format; (b) PNG format (TIFF format to PNG format); (c) watermark embedding (32 bits embedded in single band); (d) Tampering Example 1; (e) Tampering Example 2.
Algorithms 15 00213 g006
Table 1. The parameters and storage consumption of the models.
Table 1. The parameters and storage consumption of the models.
Input SizeParameter
(M)
Weight Storage (MB)FLOPs
(M)
RCF256 × 25622.3274.411.16
MultiResU-Net 256 × 2567.2683.814.55
Attention U-Net256 × 2567.9791.515.95
AAU-Net256 × 2568.4096.416.79
MultiRes-RCF256 × 2561.6419.43.29
Table 2. Hash sequences obtained by different hash algorithms.
Table 2. Hash sequences obtained by different hash algorithms.
Original TIFF FormatPNG FormatWatermark
Embedding
Tampering Example 1Tampering Example 1
MD5-based
method
b74c6f656fb1c4f2a
bcb433d05cb9750
fe9a41989b747fe4
dbc43c1d42251588
cebef967ac444ae9
e74fd3c4ffc00be7
1a4c10f80489123a
5762cbb09b26a9d8
4996176853c6ce0
69fd319c854f5a6f0
SHA-1-based methodc1d86711825e67ca9ce3
2a7e4369f16fd6e95ae0
ac5c074e1310c4e20e5b
5b9bfa022af5af6de8b3
53829639858fd908a5c
bff7c54ecc9defa5b77a7
dbdd725fc78b6a0c7bf2
bf479641eb01d66d80e1
04efdc5e4310d13c52aa
b24f61496a5b21ee1eef
RCF-based method45ddd812302d5cff
c8e927bc9ca44c30
45ddd812302d5cff
c8e927bc9ca44c30
45ddd812302d5cff
c8e927bc9ca44c30
538bd5ce4229ccfc
8a4277c9c52ebef
5347e1b7c7031414
5468457773a2704
MultiResU-Net-based method9bbb1e2554c0400
31654f04f0006ea9
9bbb1e2554c0400
31654f04f0006ea9
9bbb1e2554c0400
31654f04f0006ea9
98ab1e3554c04003
c1650f04f0006ea9
466acee454c04540
4565054755bc6d65
Attention U-Net-based method6f0943e3ea91b3a2
4943ff4fb0091c42
6f0943e3ea91b3a2
4943ff4fb0091c42
6f0943e3ea91b3a2
4943ff4fb0091c42
60250fe29a91b3a2
5943e42a7c0e2192
3fe554095995beac
300094794e8613f1
AAU-Net-based methodb3676b79401a4ff1
5bfa0c18879bf256
b3676b79401a4ff1
5bfa0c18879bf256
b3676b79401a4ff1
5bfa0c18879bf256
c5ccff23ab050ff0
5afa4c18879bf211
a78a94fa56f03906
aa40f741a31d3c3c
MultiRes-RCF-based method100a0af2570b19a8
04036553bf5c6729
100a0af2570b19a8
04036553bf5c6729
100a0af2570b19a8
04036553bf5c6729
107a05ad4337d9a8
3403641eaf5c7729
13f5f6b2940819a8
34c33a5c14cb2724
Table 3. Normalized Hamming distance of each algorithm in Table 2.
Table 3. Normalized Hamming distance of each algorithm in Table 2.
PNG FormatWatermark
Embedding
Tampering Example 1Tampering Example 1
RCF-based method0.00.00.19530.2578
MultiResU-Net-based method0.00.00.02730.1718
Attention U-Net-based method0.00.00.14840.2578
AAU-Net-based method0.00.00.14060.2890
MultiRes-RCF-based method0.00.00.11720.1992
Table 4. Integrity authentication results after each operation are shown in Figure 6 (threshold T is set to 0.02).
Table 4. Integrity authentication results after each operation are shown in Figure 6 (threshold T is set to 0.02).
PNG FormatWatermark
Embedding
Tampering Example 1Tampering Example 1
MD5-based methodTampered withTampered withTampered withTampered with
SHA-1-based methodTampered withTampered withTampered withTampered with
RCF-based methodUnchangedUnchangedTampered withTampered with
MultiResU-Net-based methodUnchangedUnchangedTampered withTampered with
Attention U-Net-based methodUnchangedUnchangedTampered withTampered with
AAU-Net-based methodUnchangedUnchangedTampered withTampered with
MultiRes-RCF-based methodUnchangedUnchangedTampered withTampered with
Table 5. Robustness test comparison of format conversion (TIFF format to PNG format, no compression).
Table 5. Robustness test comparison of format conversion (TIFF format to PNG format, no compression).
T = 0.02T = 0.03T = 0.05T = 0.10T = 0.20
MD5-based method 0%0%0%0%0%
SHA-1-based method0%0%0%0%0%
RCF-based method100%100%100%100%100%
MultiResU-Net-based method100%100%100%100%100%
Attention U-Net-based method100%100%100%100%100%
AAU-Net-based method100%100%100%100%100%
MultiRes-RCF-based method100%100%100%100%100%
Table 6. Robustness test comparison of watermark embedding (32 bits embedded in single band).
Table 6. Robustness test comparison of watermark embedding (32 bits embedded in single band).
T = 0.02T = 0.03T = 0.05T = 0.10T = 0.20
MD5-based method0%0%0%0%0%
SHA-1-based method0%0%0%0%0%
RCF-based method99.9%100%100%100%100%
MultiResU-Net-based method100%100%100%100%100%
Attention U-Net-based method99.8%99.8%99.8%99.9%100%
AAU-Net-based method99.8%100%100%100%100%
MultiRes-RCF-based method99.9%100%100%100%100%
Table 7. Tamper detection rate after 8 × 8 pixel tampering area is modified.
Table 7. Tamper detection rate after 8 × 8 pixel tampering area is modified.
T = 0.02T = 0.03T = 0.05T = 0.10T = 0.20
MD5-based method100%100%100%100%100%
SHA-1-based method100%100%100%100%100%
RCF-based method97.9%95.8%84.4%47.7%17.6%
MultiResU-Net-based method84.0%78.3%62.5%35.0%11.8%
Attention U-Net-based method93.7%91.3%84.4%68.6%36.2%
AAU-Net-based method92.8%90.9%83.0%65.6%29.5%
MultiRes-RCF-based method98.6%96.9%90.9%70.7%38.5%
Table 8. Tamper detection rate after 16 pixels have been modified.
Table 8. Tamper detection rate after 16 pixels have been modified.
T = 0.02T = 0.03T = 0.05T = 0.10T = 0.20
MD5-based method100%100%100%100%100%
SHA-1-based method100%100%100%100%100%
RCF-based method32.2%28.1%13.3%5.2%0.2%
MultiResU-Net-based method55.0%43.0%19.0%5.3%1.3%
Attention U-Net-based method86.3%78.3%55.5%23.5%4.1%
AAU-Net-based method28.6%18.4%8.5%2.3%0.5%
MultiRes-RCF-based method91.6%85.0%64.3%27.6%8.4%
Table 9. Tampering sensitivity comparison of subject-unrelated tampering with 400 RS images.
Table 9. Tampering sensitivity comparison of subject-unrelated tampering with 400 RS images.
T = 0.02T = 0.03T = 0.05T = 0.10T = 0.20
MD5-based method100%100%100%100%100%
SHA-1-based method100%100%100%100%100%
RCF-based method62.5%56.5%43.75%28.0%11.5%
MultiResU-Net-based method73.5%65.25%45.75%15.5%4.0%
Attention U-Net-based method82.0%76.5%60.25%28.75%12.25%
AAU-Net-based method82.75%80.25%65.5%29.5%10.5%
MultiRes-RCF-based method84.5%77.25%59.0%29.5%11.5%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ding, K.; Chen, S.; Yu, J.; Liu, Y.; Zhu, J. A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images. Algorithms 2022, 15, 213. https://doi.org/10.3390/a15060213

AMA Style

Ding K, Chen S, Yu J, Liu Y, Zhu J. A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images. Algorithms. 2022; 15(6):213. https://doi.org/10.3390/a15060213

Chicago/Turabian Style

Ding, Kaimeng, Shiping Chen, Jiming Yu, Yanan Liu, and Jie Zhu. 2022. "A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images" Algorithms 15, no. 6: 213. https://doi.org/10.3390/a15060213

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop