Abstract
Data sharing of remote sensing images promotes the development of remote sensing research and applications in various industries, but the sharing of remote sensing images has security issues such as piracy, leakage, and theft. The emergence of the blockchain has made it possible to solve the above problems. However, the hash function adopted by the blockchain can only verify the changes in the binary level of remote sensing images, and cannot reflect the changes of the content of remote sensing images. Aiming at the security problems in remote sensing image sharing, this paper combines blockchain and subject-sensitive hashing to build an authentication method for remote sensing images. In our method, subject-sensitive hash algorithm is used to calculate the hash value of remote sensing images, instead of using cryptographic hash function. Experiments show that our method is not only robust to operations that do not change the content of remote sensing images, but also can detect content tampering of the images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, G.Q., Zhang, H.Y., Zhang, L.C., Wang, Y.Y., Tian, C.Z.: Development and trend of Earth observation data sharing. J. Remote Sens. 20(5), 979–990 (2016)
Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)
Zhaofeng, M., Xiaochang, W., Jain, D.K., Khan, H., Hongmin, G., Zhen, W.: A blockchain-based trusted data management scheme in edge computing. IEEE Trans. Ind. Inf. 16(3), 2013–2021 (2020)
Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern. Syst. 49(11), 2266–2277 (2019)
Shahnaz, A., Qamar, U., Khalid, A.: Using blockchain for electronic health records. IEEE Access 7, 147782–147795 (2019)
Sun, Y., Zhang, L., Feng, G., Yang, B., Cao, B., Imran, M.A.: Blockchain-enabled wireless internet of things: performance analysis and optimal communication node deployment. IEEE Internet Things J. 6(3), 5791–5802 (2019)
Ding, K., Liu, Y., Xu, Q., Lu, F.: A subject-sensitive perceptual hash based on MUM-Net for the integrity authentication of high resolution remote sensing images. ISPRS Int. J. Geo Inf. 9(8), 485 (2020)
Niu, X.M., Jiao, Y.H.: An overview of perceptual hashing. Acta Electron. Sin 36, 1405–1411 (2008)
Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W., Frangi, A. (eds.) Medical Image Computing and Computer-Assisted Intervention – MICCAI 2015. MICCAI 2015. LNCS, vol. 9351. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24574-4_28
Adiga, V., Sivaswamy, J.: FPD-M-net: fingerprint image denoising and inpainting using M-Net based convolutional neural networks. arXiv Comp. Vis. Pattern Recogn. 51–61 (2019)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ding, K., Jiang, T., Zhang, H. (2022). An Authentication Method Combining Blockchain and Subject-Sensitive Hashing for the Data Sharing of Remote Sensing Image. In: Liu, Q., Liu, X., Chen, B., Zhang, Y., Peng, J. (eds) Proceedings of the 11th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 808. Springer, Singapore. https://doi.org/10.1007/978-981-16-6554-7_84
Download citation
DOI: https://doi.org/10.1007/978-981-16-6554-7_84
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6553-0
Online ISBN: 978-981-16-6554-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)