2022
DOI: 10.1002/int.22830
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain‐based privacy‐preserving authentication system for ensuring multimedia content integrity

Abstract: With the prevalence of digital cameras, multimedia data have been used to record facts and provide evidence of events. However, the integrity of multimedia data is vulnerable to attacks with the proliferation of data tampering tools. In fact, an effective multimedia content authentication system should support compliant editing (cropping, rotation, compression, and so forth) and have the ability to detect malicious data tampering. Data traceability is a feasible strategy to verify the integrity and provenance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…A Merkle tree is a data structure used to summarize and verify the integrity of a large dataset using hash functions [ 49 ]. There are various types of hash algorithms; however, SHA-256 is commonly used, as mentioned in [ 42 , 48 , 50 , 51 ]. Figure 2 illustrates the organization of the tree, with the root hash at the top, the hashes of the nodes immediately below, which receive the hashes of the data or transactions ( , , , , ), are displayed on each branch by the respective hashes ( , , , , and ), and calculated by concatenating them in pairs or singly if the total number of transactions per block is odd.…”
Section: Blockchain In the Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…A Merkle tree is a data structure used to summarize and verify the integrity of a large dataset using hash functions [ 49 ]. There are various types of hash algorithms; however, SHA-256 is commonly used, as mentioned in [ 42 , 48 , 50 , 51 ]. Figure 2 illustrates the organization of the tree, with the root hash at the top, the hashes of the nodes immediately below, which receive the hashes of the data or transactions ( , , , , ), are displayed on each branch by the respective hashes ( , , , , and ), and calculated by concatenating them in pairs or singly if the total number of transactions per block is odd.…”
Section: Blockchain In the Iotmentioning
confidence: 99%
“…A Merkle tree is a data structure used to summarize and verify the integrity of a large dataset using hash functions [49]. There are various types of hash algorithms; however, SHA-256 is commonly used, as mentioned in [42,48,50,51]. Figure 2 illustrates the organization of the tree, with the root hash R = H ABCDE at the top, the hashes of the nodes immediately below, which receive the hashes of the data or transactions (…”
Section: Blockchain Overviewmentioning
confidence: 99%
“…This is because any unauthorized modification, tampering, or corruption of data can lead to incorrect decisions and impact the overall farming operations. Implementing data validation mechanisms, digital signatures, and secure communication channels can help ensure data integrity [130]- [134]. As explained in [135], smart agriculture systems rely on networks and communication channels for data transmission.…”
Section: Figure 5 Smart Agriculture Environment Layersmentioning
confidence: 99%
“…In recent years, blockchain potential has been noted in many areas like financial, healthcare, voting, cyber security, multimedia integrity and much more. [140][141][142][143][144][145][146] Blockchain technology emerged with its applications in the financial sector, and now its applications are widely distributed in different healthcare areas, whether managing healthcare data or fighting against drug counterfeiting.…”
Section: Blockchain-based Healthcare Systemsmentioning
confidence: 99%