Abstract
With the development of multimedia and the Internet, the problem of multimedia copyright infringement has become more and more serious. The combination of digital watermark and security protocol plays a vital role in copyright protection of multimedia in the up-to-date open network environment. Most of the existing schemes involve trusted third parties and arbitration institutions, but they are not usually credible. This paper proposes a new watermarking protocol with multiple parties based on the blockchain. The protocol involves the buyer, the seller, the cloud platform and the blockchain. In the protocol, the certificateless secret key negotiation between the buyer and the seller is utilized to avoid “Man-in-the-middle Attack”, and the cloud platform is used to perform homomorphic calculations and watermark embedding operation. By using the characteristics of the blockchain such as non-tamperability and traceability, the security and fairness of the protocol can be ensured.
Similar content being viewed by others
Data availability
All data included in this study are available upon request by contact with the corresponding author.
References
Chang CC, Chung, CY (2003) An enhanced buyer seller watermarking protocol. Int Conf Commun Technol, Beijing, China, pp 1779–1783
Cox I, Miller M, Bloom J, Fridrich J, Kalker T et al (2008) Digital watermarking and steganography, Second ed. Morgan Kaufmann, Burlington. MA, USA, pp 575–589
Fan, CI, Chen, MT, Sun, WZ, et al (2007) Buyer-seller watermarking protocols with off-line trusted parties. In: proceedings of the IEEE international conference on multimedia and ubiquitous engineering. Seul, South Korea: IEEE computer society, Washington, DC, USA. pp. 1035–1040
Ferdous MS, Chowdhury MJM, Hoque MA et al (2021) A survey of consensus algorithms in public blockchain systems for crypto-currencies. J Netw Comput Appl 182:103035. https://doi.org/10.1016/j.jnca.2021.103035
Frattolillo F (2007) Watermarking protocol for web context. IEEE Trans Inf Forensics Secur 2(3):350–363. https://doi.org/10.1109/TIFS.2007.903849
Frattolillo F (2016) A buyer-friendly and mediated watermarking protocol for web context. ACM Trans Web 10(2):9. https://doi.org/10.1145/2856036
Frattolillo F (2018) Watermarking protocols: an excursus to motivate a new approach. Int J Inf Secur 17(5):587–601. https://doi.org/10.1007/s10207-017-0386-9
Frattolillo F (2019) A multiparty watermarking protocol for cloud environments. Inf Secur Tech Rep 47(Aug.):246–257. https://doi.org/10.1016/j.jisa.2019.05.011
Frattolillo F (2020) A watermarking protocol based on Blockchain. Appl Sci Basel 10(21):7746. https://doi.org/10.3390/app10217746
Hu, D, Li, Q (2009) A secure and practical buyer-seller watermarking protocol. 1st international conference on multimedia information networking and security (MINES). https://doi.org/10.1109/MINES.2009.132.
Jelly_lzy, 2019-08-21 (2019) Two key negotiation and exchange protocols. https://blog.csdn.net/u013896064/article/details/99962436. Accessed 15 May 2023
Kamel I, Albluwi Q (2009) A robust software watermarking for copyright protection. Comput Secu 28(6):395–409. https://doi.org/10.1016/j.cose.2009.01.007
Khan A, Jabeen F, Naz F et al (2016) Buyer seller watermarking protocols issues and challenges - a survey. J Netw Comput Appl 75:317–334. https://doi.org/10.1016/j.jnca.2016.08.026
Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649. https://doi.org/10.1109/83.913598
Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 15 May 2023
Surekha B, Swamy GN (2012) Sensitive digital image watermarking for copyright protection. Int J Netw Secur 15(2):113–121 https://hdl.handle.net/10210/6674
Vecchiola C, Chu X, Buyya R et al (2009) Aneka: a software platform for. NET-based cloud computing. Adv Parallel Comput 18:267–295. https://doi.org/10.3233/978-1-60750-073-5-267
Xiang YX, Ren W, Li TT et al (2021) A multi-type and decentralized data transaction scheme based on smart contracts and watermarks. J Netw Comput Appl 176:102953. https://doi.org/10.1016/j.jnca.2020.102953
Zhang J, Kou WD, Fan K et al (2006) Secure buyer – seller watermarking protocol. Inf Secur IEEE Proceed 153(1):15–18
Acknowledgements
This work was supported by the Science and Technology Research Project of Henan Province (Grant No. 212102210413, 222102210029), the Key Program of Higher Education Institutions of Henan Province (23A520009), the Special Project of Smart Teaching for Ordinary Undergraduate Colleges and Universities in Henan Province, the Curriculum Reform Research Project of Teacher Education of Henan Province (2022-JSJYYB-003), and the National Natural Science Foundation of China (Grant No. 61901160).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, M., Zeng, L., Zhao, L. et al. Multiparty watermarking protocol based on blockchain. Multimed Tools Appl 83, 367–379 (2024). https://doi.org/10.1007/s11042-023-15691-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15691-5