Enhanced computer vision applications with blockchain: A review of applications and opportunities

被引:4
作者
Ottakath, Najmath [1 ]
Al -Ali, Abdulla [1 ]
Al-Maadeed, Somaya [1 ]
Elharrouss, Omar [1 ]
Mohamed, Amr [1 ]
机构
[1] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
关键词
Blockchain; Computer Vision; Video surveillance; Video integrity; Video and image sharing; Privacy; SENSOR NETWORKS; INTERNET; SYSTEMS; STORAGE; SCHEME; CHALLENGES; FRAMEWORK; IOT;
D O I
10.1016/j.jksuci.2023.101801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Videos and image processing have significantly transformed computer vision, enabling computers to analyse, and manipulate visual data. The proliferation of cameras and IR equipment has facilitated the collection of valuable information about individuals and their surroundings. These technologies find applications in various domains, ranging from biometric entry cards and high-security clearances to surveillance. These applications form part of the Internet of Things (IoT), forming a centralized network. However, the proliferation of data and its sharing brings challenges related to security, privacy, and storage. Interactions with third-party systems may introduce vulnerabilities. To address these issues, researchers in computer vision have explored the integration of blockchain technology into various applications. This paper presents a comprehensive survey of blockchain applications in computer vision, focusing on image and video data sharing, video surveillance, biometrics, and video integrity protection. The aim is to explore how the blockchain can enhance the security, privacy, and authentication of them. It also discusses tools and techniques employed at the edge to achieve these objectives while highlighting opportunities for further improvements. Overall, this review provides insights into the integration of blockchain and computer vision, advancements, challenges, and future directions in leveraging image and video data in a blockchain-enabled environment.
引用
收藏
页数:25
相关论文
共 146 条
[51]  
Guegan D., 2017, Public blockchain versus private blockchain
[52]   Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure [J].
Guo, Hao ;
Dolhansky, Brian ;
Hsin, Eric ;
Dinh, Phong ;
Ferrer, Cristian Canton ;
Wang, Song .
2021 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2021), 2021, :686-696
[53]   Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications [J].
Gupta, Rajesh ;
Kumari, Aparna ;
Tanwar, Sudeep .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[54]   Building High Throughput Permissioned Blockchain Fabrics: Challenges and Opportunities [J].
Gupta, Suyash ;
Hellings, Jelle ;
Rahnama, Sajjad ;
Sadoghi, Mohammad .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (12) :3441-3444
[55]   Biometrics Systems Under Spoofing Attack [An evaluation methodology and lessons learned] [J].
Hadid, Abdenour ;
Evans, Nicholas ;
Marcel, Sebastien ;
Fierrez, Julian .
IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) :20-30
[56]  
Hafiz A.M., 2023, Comput Syst Sci Eng, V46
[57]   A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques [J].
Hameed M.A. ;
Abdel-Aleem O.A. ;
Hassaballah M. .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) :4639-4657
[58]   Combating Deepfake Videos Using Blockchain and Smart Contracts [J].
Hasan, Haya R. ;
Salah, Khaled .
IEEE ACCESS, 2019, 7 :41596-41606
[59]  
Hassaballah M., 2020, Digital Media Steganography, P1
[60]  
Hassaballah M., 2020, Digital Media Steganography, P17, DOI DOI 10.1016/B978-0-12-819438-6.00010-4