Proofable Image Tampering Detection for the Image of My Cat Pineapple
Proofable Image Tampering Detection for the Image of My Cat Pineapple
Figure 0: Tampering Detection for the Image of My Cat Pineapple

With the advancement of technology, it has become much easier to fake an image nowadays by using all sorts of editing software like Photoshop or advanced AI techniques like Deepfake¹. At the same time, it has become a lot harder for humankind to spot tampering in an image. To share a photo confidently in untrusted environments, such as the Internet, has become more demanding and challenging than ever before. On the other hand, the advancement of blockchain technology makes it possible to tackle an increasing number of trust-related issues. …


Photo of my drone over Lake Tyrrell, Victoria, Australia

Logs from a system are used to report what has happened on that system over time. As the importance of a system grows, so does its logs. For example, if a system handles privileged access to some very important data, its access logs could be used to audit who has accessed what and when. Other examples would be the logs of a flying system, a life-support system or a delivery robot, where their logs are critical to their domain-specific behaviors, and a way to keep them safe in a tamper-proof manner and enable future examinations is much needed. Blockchain is…

Guan Gui

A Full Stack Software Engineer that is passionate and striving for elegance and simplicity in problem-solving

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store