Skip to main content
Log in

Multiparty watermarking protocol based on blockchain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the development of multimedia and the Internet, the problem of multimedia copyright infringement has become more and more serious. The combination of digital watermark and security protocol plays a vital role in copyright protection of multimedia in the up-to-date open network environment. Most of the existing schemes involve trusted third parties and arbitration institutions, but they are not usually credible. This paper proposes a new watermarking protocol with multiple parties based on the blockchain. The protocol involves the buyer, the seller, the cloud platform and the blockchain. In the protocol, the certificateless secret key negotiation between the buyer and the seller is utilized to avoid “Man-in-the-middle Attack”, and the cloud platform is used to perform homomorphic calculations and watermark embedding operation. By using the characteristics of the blockchain such as non-tamperability and traceability, the security and fairness of the protocol can be ensured.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5

Similar content being viewed by others

Data availability

All data included in this study are available upon request by contact with the corresponding author.

References

  1. Chang CC, Chung, CY (2003) An enhanced buyer seller watermarking protocol. Int Conf Commun Technol, Beijing, China, pp 1779–1783

  2. Cox I, Miller M, Bloom J, Fridrich J, Kalker T et al (2008) Digital watermarking and steganography, Second ed. Morgan Kaufmann, Burlington. MA, USA, pp 575–589

    Google Scholar 

  3. Fan, CI, Chen, MT, Sun, WZ, et al (2007) Buyer-seller watermarking protocols with off-line trusted parties. In: proceedings of the IEEE international conference on multimedia and ubiquitous engineering. Seul, South Korea: IEEE computer society, Washington, DC, USA. pp. 1035–1040

  4. Ferdous MS, Chowdhury MJM, Hoque MA et al (2021) A survey of consensus algorithms in public blockchain systems for crypto-currencies. J Netw Comput Appl 182:103035. https://doi.org/10.1016/j.jnca.2021.103035

    Article  Google Scholar 

  5. Frattolillo F (2007) Watermarking protocol for web context. IEEE Trans Inf Forensics Secur 2(3):350–363. https://doi.org/10.1109/TIFS.2007.903849

    Article  Google Scholar 

  6. Frattolillo F (2016) A buyer-friendly and mediated watermarking protocol for web context. ACM Trans Web 10(2):9. https://doi.org/10.1145/2856036

    Article  Google Scholar 

  7. Frattolillo F (2018) Watermarking protocols: an excursus to motivate a new approach. Int J Inf Secur 17(5):587–601. https://doi.org/10.1007/s10207-017-0386-9

    Article  Google Scholar 

  8. Frattolillo F (2019) A multiparty watermarking protocol for cloud environments. Inf Secur Tech Rep 47(Aug.):246–257. https://doi.org/10.1016/j.jisa.2019.05.011

    Article  Google Scholar 

  9. Frattolillo F (2020) A watermarking protocol based on Blockchain. Appl Sci Basel 10(21):7746. https://doi.org/10.3390/app10217746

    Article  Google Scholar 

  10. Hu, D, Li, Q (2009) A secure and practical buyer-seller watermarking protocol. 1st international conference on multimedia information networking and security (MINES). https://doi.org/10.1109/MINES.2009.132.

  11. Jelly_lzy, 2019-08-21 (2019) Two key negotiation and exchange protocols. https://blog.csdn.net/u013896064/article/details/99962436. Accessed 15 May 2023

  12. Kamel I, Albluwi Q (2009) A robust software watermarking for copyright protection. Comput Secu 28(6):395–409. https://doi.org/10.1016/j.cose.2009.01.007

    Article  Google Scholar 

  13. Khan A, Jabeen F, Naz F et al (2016) Buyer seller watermarking protocols issues and challenges - a survey. J Netw Comput Appl 75:317–334. https://doi.org/10.1016/j.jnca.2016.08.026

    Article  Google Scholar 

  14. Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10(4):643–649. https://doi.org/10.1109/83.913598

    Article  Google Scholar 

  15. Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 15 May 2023

  16. Surekha B, Swamy GN (2012) Sensitive digital image watermarking for copyright protection. Int J Netw Secur 15(2):113–121 https://hdl.handle.net/10210/6674

    Google Scholar 

  17. Vecchiola C, Chu X, Buyya R et al (2009) Aneka: a software platform for. NET-based cloud computing. Adv Parallel Comput 18:267–295. https://doi.org/10.3233/978-1-60750-073-5-267

    Article  Google Scholar 

  18. Xiang YX, Ren W, Li TT et al (2021) A multi-type and decentralized data transaction scheme based on smart contracts and watermarks. J Netw Comput Appl 176:102953. https://doi.org/10.1016/j.jnca.2020.102953

    Article  Google Scholar 

  19. Zhang J, Kou WD, Fan K et al (2006) Secure buyer – seller watermarking protocol. Inf Secur IEEE Proceed 153(1):15–18

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Science and Technology Research Project of Henan Province (Grant No. 212102210413, 222102210029), the Key Program of Higher Education Institutions of Henan Province (23A520009), the Special Project of Smart Teaching for Ordinary Undergraduate Colleges and Universities in Henan Province, the Curriculum Reform Research Project of Teacher Education of Henan Province (2022-JSJYYB-003), and the National Natural Science Foundation of China (Grant No. 61901160).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Zeng, L., Zhao, L. et al. Multiparty watermarking protocol based on blockchain. Multimed Tools Appl 83, 367–379 (2024). https://doi.org/10.1007/s11042-023-15691-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15691-5

Keywords

Navigation