{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T16:19:45Z","timestamp":1770826785769,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T00:00:00Z","timestamp":1696636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["41971338"],"award-info":[{"award-number":["41971338"]}]},{"name":"National Natural Science Foundation of China","award":["42071362"],"award-info":[{"award-number":["42071362"]}]},{"name":"National Natural Science Foundation of China","award":["2022YFC3803600"],"award-info":[{"award-number":["2022YFC3803600"]}]},{"name":"National Key Research and Development Program of China","award":["41971338"],"award-info":[{"award-number":["41971338"]}]},{"name":"National Key Research and Development Program of China","award":["42071362"],"award-info":[{"award-number":["42071362"]}]},{"name":"National Key Research and Development Program of China","award":["2022YFC3803600"],"award-info":[{"award-number":["2022YFC3803600"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data. However, the existing remote-sensing image perceptual hash-authentication algorithms face security issues in storing and transmitting the original perceptual hash value. This paper proposes a remote-sensing image integrity authentication method based on blockchain and perceptual hash to address this problem. The proposed method comprises three parts: perceptual hash value generation, secure blockchain storage and transmission, and remote-sensing image integrity authentication. An NSCT-based perceptual hashing algorithm that considers the multi-band characteristics of remote-sensing images is proposed. A Perceptual Hash Secure Storage and Transmission Framework (PH-SSTF) is designed by combining Hyperledger Fabric and InterPlanetary File System (IPFS). The experimental results show that the method can effectively verify remote-sensing image integrity and tamper with the location. The perceptual hashing algorithm exhibits strong robustness and sensitivity. Meanwhile, the comparison results of data-tampering identification for multiple landscape types show that the algorithm has stronger stability and broader applicability compared with existing perceptual hash algorithms. Additionally, the proposed method provides secure storage, transmission, and privacy protection for the perceptual hash value.<\/jats:p>","DOI":"10.3390\/rs15194860","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T04:52:36Z","timestamp":1696827156000},"page":"4860","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7598-0638","authenticated-orcid":false,"given":"Dingjie","family":"Xu","sequence":"first","affiliation":[{"name":"Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education, Nanjing 210023, China"},{"name":"State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China"},{"name":"Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China"}]},{"given":"Na","family":"Ren","sequence":"additional","affiliation":[{"name":"Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education, Nanjing 210023, China"},{"name":"State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China"},{"name":"Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China"},{"name":"Hunan Engineering Research Center of Geographic Information Security and Application, Changsha 410000, China"}]},{"given":"Changqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education, Nanjing 210023, China"},{"name":"State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China"},{"name":"Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Avtar, R., Kouser, A., Kumar, A., Singh, D., Misra, P., Gupta, A., Yunus, A.P., Kumar, P., Johnson, B.A., and Dasgupta, R. (2021). Remote Sensing for International Peace and Security: Its Role and Implications. Remote Sens., 13.","DOI":"10.3390\/rs13030439"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Chen, W., Han, B., Yang, Z., and Gao, X. (2022). MSSDet: Multi-Scale Ship-Detection Framework in Optical Remote-Sensing Images and New Benchmark. Remote Sens., 14.","DOI":"10.3390\/rs14215460"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Dempster, A. (2018, January 28). GNSS Data as Court Evidence: Lessons from Remote Sensing. Proceedings of the 31st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2018), Miami, FL, USA.","DOI":"10.33012\/2018.16049"},{"key":"ref_4","first-page":"4","article-title":"Digital Signature & Encryption Implementation for Increasing Authentication, Integrity, Security and Data Non-Repudiation","volume":"4","author":"Nurhaida","year":"2017","journal-title":"Int. Res. J. Comput. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"052055","DOI":"10.1088\/1757-899X\/322\/5\/052055","article-title":"An Efficient Semi-Fragile Watermarking Scheme for Tamper Localization and Recovery","volume":"322","author":"Hou","year":"2018","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_6","first-page":"72","article-title":"Watermarking Scheme for Tampering Detection in Remote Sensing Images Using Variable Size Tiling and DWT","volume":"Volume 7810","year":"2010","journal-title":"Satellite Data Compression, Communications, and Processing VI"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5583","DOI":"10.1080\/01431161.2010.507256","article-title":"A Novel Semi-Fragile Forensic Watermarking Scheme for Remote Sensing Images","volume":"32","year":"2011","journal-title":"Int. J. Remote Sens."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Serra-Ruiz, J., Qureshi, A., and Meg\u00edas, D. (2019). Entropy-Based Semi-Fragile Watermarking of Remote Sensing Images in the Wavelet Domain. Entropy, 21.","DOI":"10.3390\/e21090847"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ding, K., Meng, F., Liu, Y., Xu, N., and Chen, W. (2018). Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image. Information, 9.","DOI":"10.3390\/info9090229"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"De Decker, B., Lapon, J., Naessens, V., and Uhl, A. (2011). Communications and Multimedia Security, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-24712-5"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zhang, X., Yan, H., Zhang, L., and Wang, H. (2020). High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features. ISPRS Int. J. Geo-Inf., 9.","DOI":"10.3390\/ijgi9040254"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ding, K., Chen, S., and Meng, F. (2018). A Novel Perceptual Hash Algorithm for Multispectral Image Authentication. Algorithms, 11.","DOI":"10.3390\/a11010006"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ding, K., Chen, S., Wang, Y., Liu, Y., Zeng, Y., and Tian, J. (2021). AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images. Remote Sens., 13.","DOI":"10.3390\/rs13245109"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ding, K., Yang, Z., Wang, Y., and Liu, Y. (2019). An Improved Perceptual Hash Algorithm Based on U-Net for the Authentication of High-Resolution Remote Sensing Image. Appl. Sci., 9.","DOI":"10.3390\/app9152972"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ding, K., Liu, Y., Xu, Q., and Lu, F. (2020). A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images. ISPRS Int. J. Geo-Inf., 9.","DOI":"10.3390\/ijgi9080485"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2168071","DOI":"10.1080\/10106049.2023.2168071","article-title":"AGIM-Net Based Subject-Sensitive Hashing Algorithm for Integrity Authentication of HRRS Images","volume":"38","author":"Ding","year":"2023","journal-title":"Geocarto Int."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ding, K., Chen, S., Zeng, Y., Wang, Y., and Yan, X. (2023). Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images. Appl. Sci., 13.","DOI":"10.3390\/app13031815"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lee, S., Seok, H.-W., Lee, K., and In, H.P. (2022). B-GPS: Blockchain-Based Global Positioning System for Improved Data Integrity and Reliability. ISPRS Int. J. Geo-Inf., 11.","DOI":"10.3390\/ijgi11030186"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Krichen, M., Ammi, M., Mihoub, A., and Almutiq, M. (2022). Blockchain for Modern Applications: A Survey. Sensors, 22.","DOI":"10.3390\/s22145274"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Qingqing, H., Yuan, J., and Jian, Y. (2011, January 21\u201323). Improved Fusion Method for Infrared and Visible Remote Sensing Imagery Using NSCT. Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications, Beijing, China.","DOI":"10.1109\/ICIEA.2011.5975735"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chen, P., Zhang, Y., Jia, Z., Yang, J., and Kasabov, N. (2017). Remote Sensing Image Change Detection Based on NSCT-HMT Model and Its Application. Sensors, 17.","DOI":"10.3390\/s17061295"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3089","DOI":"10.1109\/TIP.2006.877507","article-title":"The Nonsubsampled Contourlet Transform: Theory, Design, and Applications","volume":"15","author":"Zhou","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2023","DOI":"10.1007\/s12524-018-0859-y","article-title":"Remote Sensing Image Fusion Based on Nonlinear IHS and Fast Nonsubsampled Contourlet Transform","volume":"46","author":"Du","year":"2018","journal-title":"J. Indian Soc. Remote Sens."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3188","DOI":"10.1049\/iet-ipr.2019.1319","article-title":"Multi-Modal Image Fusion Based on Saliency Guided in NSCT Domain","volume":"14","author":"Wang","year":"2020","journal-title":"IET Image Process."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Dai, W., Tan, L., and Yang, A. (2012, January 6\u20138). Fusion Algorithm of Infrared and Visible Images Based on Local Energy Using NSCT. Proceedings of the 10th World Congress on Intelligent Control and Automation, Beijing, China.","DOI":"10.1109\/WCICA.2012.6359346"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain Challenges and Opportunities: A Survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"103276","DOI":"10.1016\/j.autcon.2020.103276","article-title":"Public and Private Blockchain in Construction Business Process and Information Integration","volume":"118","author":"Yang","year":"2020","journal-title":"Autom. Constr."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference, EuroSys\u201918, Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s42400-019-0022-2","article-title":"The Privacy Protection Mechanism of Hyperledger Fabric and Its Application in Supply Chain Finance","volume":"2","author":"Ma","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_30","unstructured":"Benet, J. (2014). IPFS\u2014Content Addressed, Versioned, P2P File System. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mukne, H., Pai, P., Raut, S., and Ambawade, D. (2019, January 6\u20138). Land Record Management Using Hyperledger Fabric and IPFS. Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India.","DOI":"10.1109\/ICCCNT45670.2019.8944471"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Nyaletey, E., Parizi, R.M., Zhang, Q., and Choo, K.-K.R. (2019, January 14\u201317). BlockIPFS\u2014Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00012"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Li, L., Yue, Z., and Wu, G. (2021, January 2\u20134). Electronic Medical Record Sharing System Based on Hyperledger Fabric and InterPlanetary File System. Proceedings of the 2021 5th International Conference on Compute and Data Analysis; ICCDA 2021, Sanya, China.","DOI":"10.1145\/3456529.3456555"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Mani, V., Manickam, P., Alotaibi, Y., Alghamdi, S., and Khalaf, O.I. (2021). Hyperledger Healthchain: Patient-Centric IPFS-Based Storage of Health Records. Electronics, 10.","DOI":"10.3390\/electronics10233003"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Xia, G.-S., Bai, X., Ding, J., Zhu, Z., Belongie, S., Luo, J., Datcu, M., Pelillo, M., and Zhang, L. (2018, January 18\u201322). DOTA: A Large-Scale Dataset for Object Detection in Aerial Images. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00418"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"111322","DOI":"10.1016\/j.rse.2019.111322","article-title":"Land-Cover Classification with High-Resolution Remote Sensing Images Using Transferable Deep Models","volume":"237","author":"Tong","year":"2020","journal-title":"Remote Sens. Environ."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","article-title":"An Introduction to ROC Analysis","volume":"27","author":"Fawcett","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Liu, M., Gao, H., Xia, X., Gui, S., and Gao, T. (2022). Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection. Comput. J., bxac186.","DOI":"10.1093\/comjnl\/bxac186"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1524","DOI":"10.1093\/comjnl\/bxaa046","article-title":"Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table","volume":"63","author":"Yu","year":"2020","journal-title":"Comput. J."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Wahid, M., Ahmad, N., Zafar, M.H., and Khan, S. (2018, January 22\u201323). On Combining MD5 for Image Authentication Using LSB Substitution in Selected Pixels. Proceedings of the 2018 International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan.","DOI":"10.1109\/ICEET1.2018.8338621"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Guo, M., Liu, H., Xu, Y., and Huang, Y. (2020). Building Extraction Based on U-Net with an Attention Block and Multiple Losses. Remote Sens., 12.","DOI":"10.3390\/rs12091400"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ding, K., Chen, S., Yu, J., Liu, Y., and Zhu, J. (2022). A New Subject-Sensitive Hashing Algorithm Based on MultiRes-RCF for Blockchains of HRRS Images. Algorithms, 15.","DOI":"10.3390\/a15060213"}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/15\/19\/4860\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:02:40Z","timestamp":1760130160000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/15\/19\/4860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,7]]},"references-count":42,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["rs15194860"],"URL":"https:\/\/doi.org\/10.3390\/rs15194860","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,7]]}}}