Next Article in Journal
Town-Watching Workshop Using Disaster Information Tweeting and Mapping System
Next Article in Special Issue
Signatures of the Crypto-Currency Market Decoupling from the Forex
Previous Article in Journal
The Effects of the Floating Action Button on Quality of Experience
Open AccessArticle

An Image Authentication Scheme Using Merkle Tree Mechanisms

Department of Computer Science and Information Engineering (CSIE), Asia University, No. 500, Liufeng Road, Wufeng District, Taichung City 41354, Taiwan
Author to whom correspondence should be addressed.
Future Internet 2019, 11(7), 149;
Received: 14 May 2019 / Revised: 25 June 2019 / Accepted: 1 July 2019 / Published: 6 July 2019
(This article belongs to the Special Issue Blockchain Theory and Its Applications)
Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration. View Full-Text
Keywords: image authentication; Merkle tree; hash function; blockchain; distributed storage image authentication; Merkle tree; hash function; blockchain; distributed storage
Show Figures

Figure 1

MDPI and ACS Style

Chen, Y.-C.; Chou, Y.-P.; Chou, Y.-C. An Image Authentication Scheme Using Merkle Tree Mechanisms. Future Internet 2019, 11, 149.

AMA Style

Chen Y-C, Chou Y-P, Chou Y-C. An Image Authentication Scheme Using Merkle Tree Mechanisms. Future Internet. 2019; 11(7):149.

Chicago/Turabian Style

Chen, Yi-Cheng; Chou, Yueh-Peng; Chou, Yung-Chen. 2019. "An Image Authentication Scheme Using Merkle Tree Mechanisms" Future Internet 11, no. 7: 149.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop