2023
DOI: 10.3390/rs15194860
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery

Dingjie Xu,
Na Ren,
Changqing Zhu

Abstract: The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data. However, the existing remote-sensing image perceptual hash-authentication algorithms face security issues in storing and transmitting the original perceptual hash value. This paper proposes a remote-sensing image integrity authentication method based on blockchain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…In the future, building upon the groundwork laid out in this paper, further investigation will be conducted into the integration of blockchain technology with both zerowatermarking and perceptual hashing [35]. This comprehensive technical fusion aims to not only enhance copyright protection but also ensure data integrity.…”
Section: Discussionmentioning
confidence: 99%
“…In the future, building upon the groundwork laid out in this paper, further investigation will be conducted into the integration of blockchain technology with both zerowatermarking and perceptual hashing [35]. This comprehensive technical fusion aims to not only enhance copyright protection but also ensure data integrity.…”
Section: Discussionmentioning
confidence: 99%
“…Currently, the primary methods for protecting remote sensing image data are categorized into digital signature technology and digital watermarking [8,9]. Digital signature technology is mainly used to verify data integrity and confirm the identity of the data sender [10].…”
Section: Related Workmentioning
confidence: 99%
“…The security performance of digital signatures, highly effective in detecting even minor changes in remote sensing image, largely depends on key management and the choice of encryption algorithms. With the advancement of computing capabilities and the development of quantum computing, these technologies need continuous updates and maintenance to ensure their long-term security [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The perceptual hashing method can be employed to compare the similarity between the current frame and the previous one, determining whether the current dehazing parameters can be retained. Furthermore, the perceptual hashing method converts images or video frames into grayscale to simplify computational load and accelerate algorithm execution 45 . The implementation principle of the perceptual hashing algorithm is illustrated in the Figure 3.…”
Section: Time Continuity Factormentioning
confidence: 99%