A Practical Blockchain Framework using Image Hashing for Image
Authentication
- URL: http://arxiv.org/abs/2004.06860v1
- Date: Wed, 15 Apr 2020 02:57:32 GMT
- Title: A Practical Blockchain Framework using Image Hashing for Image
Authentication
- Authors: Cameron White, Manoranjan Paul, and Subrata Chakraborty
- Abstract summary: Image authentication focuses on investigating and maintaining the integrity of images.
Image hashing is a technique used to calculate how similar two different images are.
This work shows that blockchain can be a suitable approach for authenticating images.
- Score: 9.080472817672264
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Blockchain is a relatively new technology that can be seen as a decentralised
database. Blockchain systems heavily rely on cryptographic hash functions to
store their data, which makes it difficult to tamper with any data stored in
the system. A topic that was researched along with blockchain is image
authentication. Image authentication focuses on investigating and maintaining
the integrity of images. As a blockchain system can be useful for maintaining
data integrity, image authentication has the potential to be enhanced by
blockchain. There are many techniques that can be used to authenticate images;
the technique investigated by this work is image hashing. Image hashing is a
technique used to calculate how similar two different images are. This is done
by converting the images into hashes and then comparing them using a distance
formula. To investigate the topic, an experiment involving a simulated
blockchain was created. The blockchain acted as a database for images. This
blockchain was made up of devices which contained their own unique image
hashing algorithms. The blockchain was tested by creating modified copies of
the images contained in the database, and then submitting them to the
blockchain to see if it will return the original image. Through this experiment
it was discovered that it is plausible to create an image authentication system
using blockchain and image hashing. However, the design proposed by this work
requires refinement, as it appears to struggle in some situations. This work
shows that blockchain can be a suitable approach for authenticating images,
particularly via image hashing. Other observations include that using multiple
image hash algorithms at the same time can increase performance in some cases,
as well as that each type of test done to the blockchain has its own unique
pattern to its data.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System [0.0]
This study primarily focuses on analyzing the security and execution efficiency of mainstream hash algorithms in the Proof of Work (PoW) calculations within blockchain systems.
It proposes an evaluation factor and conducts comparative experiments to evaluate each hash algorithm.
The experimental results indicate that there are no significant differences in the security aspects among SHA-2, SHA-3, and BLAKE2.
arXiv Detail & Related papers (2024-08-08T05:53:04Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Towards post-quantum blockchain: A review on blockchain cryptography
resistant to quantum computing attacks [0.0]
This article studies current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs.
It provides comparisons on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains.
arXiv Detail & Related papers (2024-02-01T17:29:07Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Analysis of Arbitrary Content on Blockchain-Based Systems using BigQuery [0.0]
We develop and apply a cloud-based approach for quickly discovering and classifying content on public blockchains.
Our method can be adapted to different blockchain systems and offers insights into content-related usage patterns and potential cases of abuse.
To the best of our knowledge, the presented study is the first to systematically analyze non-financial content stored on the blockchain.
arXiv Detail & Related papers (2022-03-17T15:12:38Z) - Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase [2.94824047753242]
In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
arXiv Detail & Related papers (2021-12-21T07:32:22Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Deep Reinforcement Learning with Label Embedding Reward for Supervised
Image Hashing [85.84690941656528]
We introduce a novel decision-making approach for deep supervised hashing.
We learn a deep Q-network with a novel label embedding reward defined by Bose-Chaudhuri-Hocquenghem codes.
Our approach outperforms state-of-the-art supervised hashing methods under various code lengths.
arXiv Detail & Related papers (2020-08-10T09:17:20Z) - Assuring the Integrity of Videos from Wireless-based IoT Devices using
Blockchain [0.0]
We utilize the technology to verify the authenticity of a video captured by an IoT device for forensic investigation purposes.
Theproposed approach computes the hash of the video frames before they leave the IoT device and are transferred to a remote basestation.
The hash is then stored on multiple nodes on a permissioned blockchain platform.
Incase the video is modified, the discrepancy will be detected byinvestigating the previously stored hash on the blockchain andcomparing it with the hash of the existing frame in question.
arXiv Detail & Related papers (2020-02-28T23:36:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.