2021
DOI: 10.1007/978-981-16-6554-7_84
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Method Combining Blockchain and Subject-Sensitive Hashing for the Data Sharing of Remote Sensing Image

Abstract: Data sharing of remote sensing images promotes the development of remote sensing research and applications in various industries, but the sharing of remote sensing images has security issues such as piracy, leakage, and theft. The emergence of the blockchain has made it possible to solve the above problems. However, the hash function adopted by the blockchain can only verify the changes in the binary level of remote sensing images, and cannot reflect the changes of the content of remote sensing images. Aiming … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Researchers like Yongfei Lv [8] have stored encrypted hash values of remote sensing images on the blockchain to protect digital copyright. Kaimeng Ding [18] proposed an authentication method combining subject-sensitive hash with blockchain for remote sensing images, focusing on image content's main features for robust security. Despite blockchain's storage limitations, Dingjie Xu [9] suggested a method integrating blockchain technology with perceptual hashing, storing the perceptual hash value of images in IPFS and recording the storage address on the blockchain.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers like Yongfei Lv [8] have stored encrypted hash values of remote sensing images on the blockchain to protect digital copyright. Kaimeng Ding [18] proposed an authentication method combining subject-sensitive hash with blockchain for remote sensing images, focusing on image content's main features for robust security. Despite blockchain's storage limitations, Dingjie Xu [9] suggested a method integrating blockchain technology with perceptual hashing, storing the perceptual hash value of images in IPFS and recording the storage address on the blockchain.…”
Section: Related Workmentioning
confidence: 99%