A New Query Integrity Verification Method for Encrypted Data in Database Outsourcing

Author(s):  
Miyoung Jang ◽  
Min Yoon ◽  
Youngho Song ◽  
Jae-Woo Chang
2019 ◽  
Vol 11 (7) ◽  
pp. 149
Author(s):  
Yi-Cheng Chen ◽  
Yueh-Peng Chou ◽  
Yung-Chen Chou

Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper proposes a new image verification mechanism based on the Merkle tree technique in the blockchain. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. In image verification, the verification of each image can be performed by the Merkle tree mechanism to obtain the hash value of the Merkle tree node on the path. In addition, the method combines the Inter-Planetary File System (IPFS) to improve the availability of images. The main purpose of this paper is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of the image but also restore the tampered area in the case of image tampering. Since the proposed method employs the blockchain mechanism, the image verification mechanism does not need third party resources . The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieved the goal of image authentication and tampered area restoration.


2014 ◽  
Vol 536-537 ◽  
pp. 489-493
Author(s):  
Long Chen ◽  
Xiao Yin Yi

To extend the flexibility of data integrity verification method,adapted to the different verification environment, proposed an improved solution that can support multi-granularity.It organizes files into three kinds of granularity such as data blocks,data sub-blocks and basic-blocks,basic-block realize data gathered to form data sub-block.Sign in the data sub-block,using signature of the sub-block to generate signature of block. Improvement program can achieve the verification of data blocks and sub-blocks. Validation of data block can reduce the data traffic in the validation process,two particle combination can improve the overall efficiency.In the proposed layered merkel hash tree is put forward,the dynamic operation can be supported by the sub-block or the block.Securitycommunication performance analysis show that the improvement program is effective and has a better practicability


Author(s):  
Takaaki Yamada ◽  
Yoshiyasu Takahashi ◽  
Yasuhiro Fujii ◽  
Ryu Ebisawa ◽  
Hiroshi Yoshiura ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Xu Zhang ◽  
Xilin Liu ◽  
Yang Chen ◽  
Huazhong Shu

A new blind integrity verification method for medical image is proposed in this paper. It is based on a new kind of image features, known as Krawtchouk moments, which we use to distinguish the original images from the modified ones. Basically, with our scheme, image integrity verification is accomplished by classifying images into the original and modified categories. Experiments conducted on medical images issued from different modalities verified the validity of the proposed method and demonstrated that it can be used to detect and discriminate image modifications of different types with high accuracy. We also compared the performance of our scheme with a state-of-the-art solution suggested for medical images—solution that is based on histogram statistical properties of reorganized block-based Tchebichef moments. Conducted tests proved the better behavior of our image feature set.


Sign in / Sign up

Export Citation Format

Share Document