Skip to main content
Log in

B2IPTS: A blockchain-based intellectual property transaction framework

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In the era of the digital economy, the protection of digital intellectual property is an important issue. At present, blockchain is widely used in the field of intellectual property protection. The market cap of NFT achieved tens of billions of dollars in a short period of time. Due to the lack of transaction openness, users are far less enthusiastic about the consortium blockchain-based intellectual property trading market. However, NFT is also plagued by a large number of pirated works. Existing methods are far from meeting the requirements of safe and efficient intellectual property protection tasks. To address this issue, we propose B2IPTS, a novel framework that integrates the advantages of consortium blockchain and cryptocurrency in the field of intellectual property protection. Our framework provides efficient ways to register intellectual property and execute transactions across blockchains. The property owners and property purchasers can exchange assets across heterogeneous blockchains without relying on a trusted intermediary. We use blockchain and cryptography to achieve three characteristics: (i) efficiency-fast on-chain certificate storage, (ii) versatility-compatibility with most blockchain structures, and (iii) atomicity of transactions-after a successful payment, the purchaser will definitely obtain the property. B2IPTS is designed as a decentralized system framework based on the consortium blockchain, and its primary functions rely on smart contracts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. such as QmR8kNhPdqF3NsBG7MDtH5Hrp17NYwPQffwt DvPpa2X3FL.

  2. https://ropsten.etherscan.io/address/0x958C8BAF7EF341Cd830eE7821BfD5A1ca8F355d2.

References

  • Ahmaderaghi B, Kurugollu F, Rincon JM Del, Bouridane A (2018) Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Trans Comput Imaging 4(1):46–59

    Article  MathSciNet  Google Scholar 

  • Chamoso P, Rivas A, Martín-Limorti JJ, Rodríguez S (2017) A hash based image matching algorithm for social networks. In International conference on practical applications of agents and multi-agent systems. Springer 183–190

  • Cornish W, Llewelyn D, Aplin T (2003) Intellectual Property: Patents, Copyright, Trade Marks and Allied Rights. London: Sweet & Maxwell, London

    Google Scholar 

  • Daming L, Lianbing D, Bhooshan GB, Haoxiang W, Chang C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inform Sci 479:432–447

    Article  Google Scholar 

  • Dan B, Craig G, Ben L, Hovav S (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques. Springer 416–432

  • Deshpande A, Herlihy M (2020) Privacy-preserving cross-chain atomic swaps. In International Conference on Financial Cryptography and Data Security. Springer 540–549

  • Envato (2021) Registering your music with youtube content id. Available at: https://help.elements.envato.com/hc/en-us/articles/360016435492-Guide-to-YouTube-Content-ID-Copyright-Notices. Accessed 18 Mar 2023

  • Erwig A, Faust S, Hostáková K, Maitra M, Riahi S (2021) Two-party adaptor signatures from identification schemes. Public Key Cryptogr 1:451–480

    MathSciNet  MATH  Google Scholar 

  • Ethereum (2020) https://github.com/ethereum/consensus-specs/blob/dev/specs/phase0/beacon-chain.md#bls-signatures. Accessed 30 Aug 2021. [EB/OL]

  • Giulio M, Pedro M-S, Clara S, Aniket K, Matteo M ( 2019) Anonymous multi-hop locks for blockchain scalability and interoperability. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019

  • Gürkaynak G, Yılmaz I, Yeşilaltay B, Bengi B (2018) Intellectual property law and practice in the blockchain realm. Comput Law Secur Rev 34(4):847–862

    Article  Google Scholar 

  • Halloush Zain A, Yaseen Qussai M (2019) A blockchain model for preserving intellectual property. In Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems 1–5

  • Hao Q, Luo L, Jan Steve TK, Wang G (2021) It’s not what it looks like: Manipulating perceptual hashing based applications. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 69–85

  • Hatoum Makram W, Jean-François C, Raphael C, Rony D (2021) Using deep learning for image watermarking attack. Signal Process Image Commun 90:116019

    Article  Google Scholar 

  • Ito K, O’Dair M (2019) A critical examination of the application of blockchain technology to intellectual property management. 317–335

  • Jnoub N, Klas W (2019) Detection of tampered images using blockchain technology. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 70–73. IEEE

  • Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63

    Article  Google Scholar 

  • Kahng Andrew B, Lach J, Mangione-Smith William H, Mantik S, Markov Igor L, Potkonjak M, Tucker P, Wang H, Wolfe G (1998) Watermarking techniques for intellectual property protection. In Proceedings of the 35th annual Design Automation Conference 776–781

  • Lee E, Yoon Y (2019) Trusted information project platform based on blockchain for sharing strategy. Journal of Ambient Intelligence and Humanized Computing 1–11

  • Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204–2220

    Article  Google Scholar 

  • Li T, Wang Z, Yang G, Cui Y, Chen Y, Xiaomei Y (2021) Semi-selfish mining based on hidden Markova decision process. Int J Intell Syst 36(7):3596–3612

    Article  Google Scholar 

  • Li Y, Wang H, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171–193

    Article  Google Scholar 

  • Masoumeh S, Nils L, Jiaqi W, Xinda L, Florian K (2021) On the robustness of backdoor-based watermarking in deep neural networks. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security 177–188

  • Maurice H (2018) Atomic cross-chain swaps. In Proceedings of the 2018 ACM symposium on principles of distributed computing 245–254

  • Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Available at: https://assets.pubpub.org/d8wct41f/31611263538139.pdf. Accessed 18 Mar 2023

  • Poon J, Dryja T (2016) The bitcoin lightning network: scalable off-chain instant payments. Available at: https://static1.squarespace.com/static/6148a75532281820459770d1/t/61af971f7ee2b432f1733aee/1638897446181/lightning-network-paper.pdf. Accessed 18 Mar 2023

  • Putz B, Pernul G (2020) Detecting blockchain security threats. In 2020 IEEE International Conference on Blockchain (Blockchain) 313–320. IEEE

  • Qi Z, Zhang Leo Y, Jun Z, Longxiang G, Yong X (2020) Protecting IP of deep neural networks with watermarking: a new label helps. Adv Knowl Discov Data Min 12085:462

    Article  Google Scholar 

  • Rai S, Boghey R, Shahane D, Saxena P (2019) Digital image watermarking against geometrical attack. Data, Eng Appl 2(2019):129–145

    Google Scholar 

  • Ramasamy R, Arumugam V (2021) Robust image watermarking using fractional Krawtchouk transform with optimization. J Ambient Intell Humaniz Comput 12(7):7121–7132

    Article  Google Scholar 

  • Regazzoni F, Palmieri P, Smailbegovic F, Cammarota R, Polian I (2021) Protecting artificial intelligence IPS: a survey of watermarking and fingerprinting for machine learning. CAAI Trans Intell Technol 6(2):180–191

    Article  Google Scholar 

  • Rhodes EP (2021) Cryptopunks and copyrights: What’s all the fuss about?. Available at: https://www.theouterrealm.io/blog/cryptopunks-copyrights. Accessed 18 Mar 2023

  • Schnorr C-P (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174

    Article  MathSciNet  MATH  Google Scholar 

  • Shawdagor J (2022) Two nft apers fight over which iteration is the real fake version of bayc. Available at: https://www.banklesstimes.com/news/2021/12/31/two-nft-apers-fight-over-which-iteration-is-the-real-fake-version-of-bayc/. Accessed 18 Mar 2023

  • Song H, Zhu N, Xue R, He J, Zhang K, Wang J (2021) Proof-of-contribution consensus mechanism for blockchain and its application in intellectual property protection. Inform Process Manag 58(3):102507

    Article  Google Scholar 

  • Sri AKT, Giulio M (2021) Lockable signatures for blockchains: scriptless scripts for all signatures. In 2021 IEEE Symposium on Security and Privacy (SP)937–954. IEEE

  • Tevora Threat Research Group TTRG (2021) 2021 hyperledger fabric penetration test, Linux Foundation 2021 HyperLedger Fabric Penetration Test. Available at: https://wiki.hyperledger.org/download/attachments/13861997/2021%20HyperLedger%20Fabric%20Penetration%20Test%20v0.1.pdf?api=v2a. Accessed 18 Mar 2023

  • Thanki Rohit M, Kothari Ashish M (2020) Hybrid domain watermarking technique for copyright protection of images using speech watermarks. J Ambient Intell Humaniz Comput 11(5):1835–1857

    Article  Google Scholar 

  • Tsai W-T, Feng L, Zhang H, You Y, Wang L, Zhong Y (2017) Intellectual-property blockchain-based protection model for microfilms. In 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE)174–178. IEEE

  • Uchida Y, Nagai Y, Sakazawa S, Satoh S (2017) Embedding watermarks into deep neural networks. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval 269–277

  • Vadrevu P, Perdisci R (2019) What you see is not what you get: discovering and tracking social engineering attack campaigns. In Proceedings of the Internet Measurement Conference308–321

  • Wang W, Song J, Xu G, Li Y, Wang Ca, Andwa SH (2020) Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133–1144

    Article  Google Scholar 

  • Xiao L, Huang W, Xie Y, Xiao W, Li K-C (2020) A blockchain-based traceable IP copyright protection algorithm. IEEE Access 8:49532–49542

    Article  Google Scholar 

  • Yang G, Wang Y, Wang Z, Tian Y, Xiaomei Y, Li S (2020) IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers. Int J Intell Syst 35(11):1735–1748

    Article  Google Scholar 

  • Zaghloul E, Li T, Mutka Matt W, Ren J (2020) Bitcoin and blockchain: security and privacy. IEEE Internet Things J 7(10):10288–10313

    Article  Google Scholar 

  • Zannettou S, Caulfield T, Bradlyn B, De Cristofaro E, Stringhini G, Blackburn J (2020) Characterizing the use of images in state-sponsored information warfare operations by russian trolls on twitter. In Proceedings of the International AAAI Conference on Web and Social Media 14:774–785

  • Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy I (2018). Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security159–172

  • Zhu P, Hu J, Li X, Zhu Q (2023) Using blockchain technology to enhance the traceability of original achievements. IEEE Trans Eng Manage 70(5):1693–1707

    Article  Google Scholar 

  • Zou M (2019) China’s top photo agency visual china group accused of selling images of national flag, claiming copyright to black hole shot, 2019. https://www.scmp.com/news/china/society/article/3005897/chinas-top-photo-agency-accused-selling-images-national-flag

Download references

Acknowledgements

This work was supported in part by the National Key Project of China (No. 2020YFB1005700), in part by the National Key Research and Development Program of China (No. 2021YFA1000600), in part by the National Key Research and Development (R &D) Program, Young Scientist Scheme (No. 2022YFB3102400), in part by the National Natural Science Foundation of China (No. 62132018, No. 62172117), and in part by the National Key Research and Development Program of Guangdong Province (No. 2020B0101090002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chang Chen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ai, S., Chen, C., Tang, J. et al. B2IPTS: A blockchain-based intellectual property transaction framework. J Ambient Intell Human Comput 14, 7663–7678 (2023). https://doi.org/10.1007/s12652-023-04577-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-023-04577-x

Keywords

Navigation