Abstract
In the era of the digital economy, the protection of digital intellectual property is an important issue. At present, blockchain is widely used in the field of intellectual property protection. The market cap of NFT achieved tens of billions of dollars in a short period of time. Due to the lack of transaction openness, users are far less enthusiastic about the consortium blockchain-based intellectual property trading market. However, NFT is also plagued by a large number of pirated works. Existing methods are far from meeting the requirements of safe and efficient intellectual property protection tasks. To address this issue, we propose B2IPTS, a novel framework that integrates the advantages of consortium blockchain and cryptocurrency in the field of intellectual property protection. Our framework provides efficient ways to register intellectual property and execute transactions across blockchains. The property owners and property purchasers can exchange assets across heterogeneous blockchains without relying on a trusted intermediary. We use blockchain and cryptography to achieve three characteristics: (i) efficiency-fast on-chain certificate storage, (ii) versatility-compatibility with most blockchain structures, and (iii) atomicity of transactions-after a successful payment, the purchaser will definitely obtain the property. B2IPTS is designed as a decentralized system framework based on the consortium blockchain, and its primary functions rely on smart contracts.
Similar content being viewed by others
Notes
such as QmR8kNhPdqF3NsBG7MDtH5Hrp17NYwPQffwt DvPpa2X3FL.
References
Ahmaderaghi B, Kurugollu F, Rincon JM Del, Bouridane A (2018) Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Trans Comput Imaging 4(1):46–59
Chamoso P, Rivas A, Martín-Limorti JJ, Rodríguez S (2017) A hash based image matching algorithm for social networks. In International conference on practical applications of agents and multi-agent systems. Springer 183–190
Cornish W, Llewelyn D, Aplin T (2003) Intellectual Property: Patents, Copyright, Trade Marks and Allied Rights. London: Sweet & Maxwell, London
Daming L, Lianbing D, Bhooshan GB, Haoxiang W, Chang C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inform Sci 479:432–447
Dan B, Craig G, Ben L, Hovav S (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques. Springer 416–432
Deshpande A, Herlihy M (2020) Privacy-preserving cross-chain atomic swaps. In International Conference on Financial Cryptography and Data Security. Springer 540–549
Envato (2021) Registering your music with youtube content id. Available at: https://help.elements.envato.com/hc/en-us/articles/360016435492-Guide-to-YouTube-Content-ID-Copyright-Notices. Accessed 18 Mar 2023
Erwig A, Faust S, Hostáková K, Maitra M, Riahi S (2021) Two-party adaptor signatures from identification schemes. Public Key Cryptogr 1:451–480
Ethereum (2020) https://github.com/ethereum/consensus-specs/blob/dev/specs/phase0/beacon-chain.md#bls-signatures. Accessed 30 Aug 2021. [EB/OL]
Giulio M, Pedro M-S, Clara S, Aniket K, Matteo M ( 2019) Anonymous multi-hop locks for blockchain scalability and interoperability. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019
Gürkaynak G, Yılmaz I, Yeşilaltay B, Bengi B (2018) Intellectual property law and practice in the blockchain realm. Comput Law Secur Rev 34(4):847–862
Halloush Zain A, Yaseen Qussai M (2019) A blockchain model for preserving intellectual property. In Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems 1–5
Hao Q, Luo L, Jan Steve TK, Wang G (2021) It’s not what it looks like: Manipulating perceptual hashing based applications. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 69–85
Hatoum Makram W, Jean-François C, Raphael C, Rony D (2021) Using deep learning for image watermarking attack. Signal Process Image Commun 90:116019
Ito K, O’Dair M (2019) A critical examination of the application of blockchain technology to intellectual property management. 317–335
Jnoub N, Klas W (2019) Detection of tampered images using blockchain technology. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 70–73. IEEE
Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63
Kahng Andrew B, Lach J, Mangione-Smith William H, Mantik S, Markov Igor L, Potkonjak M, Tucker P, Wang H, Wolfe G (1998) Watermarking techniques for intellectual property protection. In Proceedings of the 35th annual Design Automation Conference 776–781
Lee E, Yoon Y (2019) Trusted information project platform based on blockchain for sharing strategy. Journal of Ambient Intelligence and Humanized Computing 1–11
Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204–2220
Li T, Wang Z, Yang G, Cui Y, Chen Y, Xiaomei Y (2021) Semi-selfish mining based on hidden Markova decision process. Int J Intell Syst 36(7):3596–3612
Li Y, Wang H, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171–193
Masoumeh S, Nils L, Jiaqi W, Xinda L, Florian K (2021) On the robustness of backdoor-based watermarking in deep neural networks. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security 177–188
Maurice H (2018) Atomic cross-chain swaps. In Proceedings of the 2018 ACM symposium on principles of distributed computing 245–254
Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Available at: https://assets.pubpub.org/d8wct41f/31611263538139.pdf. Accessed 18 Mar 2023
Poon J, Dryja T (2016) The bitcoin lightning network: scalable off-chain instant payments. Available at: https://static1.squarespace.com/static/6148a75532281820459770d1/t/61af971f7ee2b432f1733aee/1638897446181/lightning-network-paper.pdf. Accessed 18 Mar 2023
Putz B, Pernul G (2020) Detecting blockchain security threats. In 2020 IEEE International Conference on Blockchain (Blockchain) 313–320. IEEE
Qi Z, Zhang Leo Y, Jun Z, Longxiang G, Yong X (2020) Protecting IP of deep neural networks with watermarking: a new label helps. Adv Knowl Discov Data Min 12085:462
Rai S, Boghey R, Shahane D, Saxena P (2019) Digital image watermarking against geometrical attack. Data, Eng Appl 2(2019):129–145
Ramasamy R, Arumugam V (2021) Robust image watermarking using fractional Krawtchouk transform with optimization. J Ambient Intell Humaniz Comput 12(7):7121–7132
Regazzoni F, Palmieri P, Smailbegovic F, Cammarota R, Polian I (2021) Protecting artificial intelligence IPS: a survey of watermarking and fingerprinting for machine learning. CAAI Trans Intell Technol 6(2):180–191
Rhodes EP (2021) Cryptopunks and copyrights: What’s all the fuss about?. Available at: https://www.theouterrealm.io/blog/cryptopunks-copyrights. Accessed 18 Mar 2023
Schnorr C-P (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174
Shawdagor J (2022) Two nft apers fight over which iteration is the real fake version of bayc. Available at: https://www.banklesstimes.com/news/2021/12/31/two-nft-apers-fight-over-which-iteration-is-the-real-fake-version-of-bayc/. Accessed 18 Mar 2023
Song H, Zhu N, Xue R, He J, Zhang K, Wang J (2021) Proof-of-contribution consensus mechanism for blockchain and its application in intellectual property protection. Inform Process Manag 58(3):102507
Sri AKT, Giulio M (2021) Lockable signatures for blockchains: scriptless scripts for all signatures. In 2021 IEEE Symposium on Security and Privacy (SP)937–954. IEEE
Tevora Threat Research Group TTRG (2021) 2021 hyperledger fabric penetration test, Linux Foundation 2021 HyperLedger Fabric Penetration Test. Available at: https://wiki.hyperledger.org/download/attachments/13861997/2021%20HyperLedger%20Fabric%20Penetration%20Test%20v0.1.pdf?api=v2a. Accessed 18 Mar 2023
Thanki Rohit M, Kothari Ashish M (2020) Hybrid domain watermarking technique for copyright protection of images using speech watermarks. J Ambient Intell Humaniz Comput 11(5):1835–1857
Tsai W-T, Feng L, Zhang H, You Y, Wang L, Zhong Y (2017) Intellectual-property blockchain-based protection model for microfilms. In 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE)174–178. IEEE
Uchida Y, Nagai Y, Sakazawa S, Satoh S (2017) Embedding watermarks into deep neural networks. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval 269–277
Vadrevu P, Perdisci R (2019) What you see is not what you get: discovering and tracking social engineering attack campaigns. In Proceedings of the Internet Measurement Conference308–321
Wang W, Song J, Xu G, Li Y, Wang Ca, Andwa SH (2020) Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133–1144
Xiao L, Huang W, Xie Y, Xiao W, Li K-C (2020) A blockchain-based traceable IP copyright protection algorithm. IEEE Access 8:49532–49542
Yang G, Wang Y, Wang Z, Tian Y, Xiaomei Y, Li S (2020) IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers. Int J Intell Syst 35(11):1735–1748
Zaghloul E, Li T, Mutka Matt W, Ren J (2020) Bitcoin and blockchain: security and privacy. IEEE Internet Things J 7(10):10288–10313
Zannettou S, Caulfield T, Bradlyn B, De Cristofaro E, Stringhini G, Blackburn J (2020) Characterizing the use of images in state-sponsored information warfare operations by russian trolls on twitter. In Proceedings of the International AAAI Conference on Web and Social Media 14:774–785
Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy I (2018). Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security159–172
Zhu P, Hu J, Li X, Zhu Q (2023) Using blockchain technology to enhance the traceability of original achievements. IEEE Trans Eng Manage 70(5):1693–1707
Zou M (2019) China’s top photo agency visual china group accused of selling images of national flag, claiming copyright to black hole shot, 2019. https://www.scmp.com/news/china/society/article/3005897/chinas-top-photo-agency-accused-selling-images-national-flag
Acknowledgements
This work was supported in part by the National Key Project of China (No. 2020YFB1005700), in part by the National Key Research and Development Program of China (No. 2021YFA1000600), in part by the National Key Research and Development (R &D) Program, Young Scientist Scheme (No. 2022YFB3102400), in part by the National Natural Science Foundation of China (No. 62132018, No. 62172117), and in part by the National Key Research and Development Program of Guangdong Province (No. 2020B0101090002).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ai, S., Chen, C., Tang, J. et al. B2IPTS: A blockchain-based intellectual property transaction framework. J Ambient Intell Human Comput 14, 7663–7678 (2023). https://doi.org/10.1007/s12652-023-04577-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-023-04577-x