2020
DOI: 10.4018/978-1-7998-2701-6.ch014
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Visual Blockchain With Merkle Tree

Abstract: Although our communities are paying extensive attention to the blockchain technology, it is still far away from realistic applications. Thus, this red-hot technology could be understood and employed for visual applications. Authors focus on online videos that collect sufficient user clicks owning to the high demand every day. When people watch the videos of TV drama episodes in an online website, they often need to exactly organise the playlists in ascending or descending order. However, video websites such as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…(5) To retrieve a specific frame, load the compressed matrix and select the appropriate column of blocks. (6) To access a particular block within a frame, locate and decompress the corresponding row from the matrix.…”
Section: The Integration Of Video Blockchain Technology Into Iot Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…(5) To retrieve a specific frame, load the compressed matrix and select the appropriate column of blocks. (6) To access a particular block within a frame, locate and decompress the corresponding row from the matrix.…”
Section: The Integration Of Video Blockchain Technology Into Iot Networkmentioning
confidence: 99%
“…The burgeoning field of video blockchain, originating from our preceding research endeavors, offers a promising avenue for enhancing the privacy of video data within IoT networks [3][4][5][6]. We embark on this exploration of data privacy in IoT networks.…”
Section: Introductionmentioning
confidence: 99%
“…As a major component of blockchain technology [10], the choice of specific implementation scheme needs careful consideration. In this experiment, the delegated proof of stake (dpos) algorithm is selected.…”
Section: Implementation Of Distributed Storage Module For Medical Datamentioning
confidence: 99%
“…The asymmetric encryption algorithm of the data layer uses the public key and the private key respectively in the process of "encryption" and "decryption", including Asymmetric encryption, elliptic curve encryption algorithm and Merkle tree [2] of data layer. A Merkle tree is a binary hash tree used for fast recursion and large scale data integrity checking purposes.…”
Section: Maintaining the Integrity Of The Specificationsmentioning
confidence: 99%