skip to main content
10.1145/3494106.3528674acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery

Published: 30 May 2022 Publication History

Abstract

In a data sharing network where parties lack mutual trust, credible traitor tracing is indispensable to reliable data delivery. Currently, the main obstacles for traitor tracing are the deficiency of content-independent data watermarking scheme and the untrustworthiness of third parties. In view of this, we propose the T-Tracer --- an encoding-based watermarking scheme. With T-Tracer, each party of data delivery embeds its digital fingerprint into the byte sequence of the shared data by generating a tailor-made symbol mapping table, whereby the watermarking can handle any type of data. A blockchain network overlaying all data sharing participants serves as a trusted third party to ensure the credibility of T-Tracer. By applying T-Tracer, anyone in the network can recognize the culprits by identifying their fingerprints from the data objects that appear as evidence of data delivery repudiation. The evaluation results show that T-Tracer is effective and practical in improving the credibility of traitor tracing.

Supplementary Material

MP4 File (BSCI22-bsci09.mp4)
T-Tracer is a new watermarking scheme for traitor tracing in non-repudiation data delivery. It uses Symbol Mapping Coding to make the watermarking content-independent and employs blockchain network to build the trusted third party, and thus can greatly improve the applicability of data watermarking and the credibility of traitor tracing.

References

[1]
H. Abdel-Nabi and A. Al-Haj. 2021. Reversible Data Hiding in Adjacent Zeros. Multimedia Systems, Vol. 27, 10 (2021), 1--17.
[2]
M. T. Ahvanooey, Q. Li, H. J. Shim, and Y. Huang. 2018. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. Security and Communication Networks, Vol. 2018 (2018), 1--22.
[3]
A. A. Alsabhany, A. H. Ali, F. Radzuan, A. H. Azni, and M. R. Mokhtar. 2020. Digital Audio Steganography: Systematic Review, Classification, and Analysis of the Current State of the Art. Computer Science Review, Vol. 38, 100316 (2020), 1--27.
[4]
M. Aman, A. Khan, B. Ahmad, and S. Kouser. 2017. A Hybrid Text Steganography Approach Utilizing Unicode Space Characters and Zero-Width Character. International Journal on Information Technologies and Security, Vol. 9, 1 (2017), 85--100.
[5]
M. Cash and M. A. Bassiouni. 2018. Two-Tier Permission-ed and Permission-less Blockchain for Secure Data Sharing. In Proceedings of the IEEE International Conference on Smart Cloud (SmartCloud). IEEE, New York, NY, USA, 138--144.
[6]
A. C. Catlin, C. Hewanadungodage, S. Pujol, L. Laughery, C. Sim, A. Puranam, and A. Bejarano. 2018. A Cyberplatform for Sharing Scientific Research Data at DataCenterHub. Computing in Science and Engineering, Vol. 20, 3 (2018), 49--70.
[7]
B. Chor, A. Fiat, and M. Naor. 1994. Tracing Traitors. In Advances in Cryptology, Proceedings of the 14th Annual International Cryptology Conference (CRYPTO'94) (Lecture Notes in Computer Science, Vol. 839). Springer, Santa Barbara, California, USA, 257--270.
[8]
H. Fang, W. Zhang, H. Zhou, H. Cui, and N. Yu. 2019. Screen-Shooting Resilient Watermarking. IEEE Transactions on Information Forensics and Security, Vol. 14, 6 (2019), 1403--1418.
[9]
K. K. Gai, K. K. R. Choo, and L. H. Zhu. 2018. Blockchain-Enabled Reengineering of Cloud Datacenters. IEEE Cloud Computing, Vol. 5, 6 (2018), 21--25.
[10]
K. Jeevan and S. Krishnakumar. 2019. Image Hiding Technique Using a Pseudo Hexagonal Structure Approach. International Journal of Computers and Applications, Vol. 41, 5 (2019), 359--366.
[11]
Ziyu Jiang and Chi-Man Pun. 2018. Reversible Image Watermarking Using Prediction Value Computation With Gradient Analysis. In Proceedings of the 2nd International Workshop on Multimedia Privacy and Security (MPS). ACM, New York, NY, USA, 48--53.
[12]
P. Kadian, S. M. Arora, and N. Arora. 2021. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey. Wireless Personal Communications 12 (2021), 1--25.
[13]
U. Khadim, M. M. Iqbal, and M. A. Azam. 2021. An Intelligent Three-Level Digital Watermarking Method for Document Protection. Mehran University Research Journal of Engineering and Technology, Vol. 40, 2 (2021), 323--334.
[14]
K. Kingsbury. 2020. Jepsen. https://github.com/jepsen-io/jepsen Retrieved March 3, 2022 from
[15]
D. Liu and M. Zhou. 2007. Text Watermarking Technology Based on Storing Hiding Information in Redundant Code of Symbol. Application Research of Computers 2 (2007), 155--157.
[16]
Y. Liu, Y. Zhu, and G. Xin. 2015. A Zero-Watermarking Algorithm Based on Merging Features of Sentences for Chinese Text. Journal of the Chinese Institute of Engineers, Vol. 38, 3 (2015), 391--398.
[17]
Z. M. Lu, Z. H. Wang, and Y. L. Liu. 2021. Multipurpose Multilevel Multichannel Information Hiding Framework for Multimedia Protection, Authentication and Traitor Tracing. International Journal of Innovative Computing Information and Control, Vol. 17, 4 (2021), 1257--1274.
[18]
C. Luo, F. Yuan, Q. Gao, J. Yang, and J. Xu. 2017. Anti-reverse-engineering tool of executable files on the Windows platform. In Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Vol. 1. 797--800.
[19]
Z. Ma. 2017. CPSec DLP: Kernel-Level Content Protection Security System of Data Leakage Prevention. Chinese Journal of Electronics, Vol. 26, 4 (2017), 827--836.
[20]
H. Mareen, J. de Praeter, G. van Wallendael, and P. Lambert. 2019. A Scalable Architecture for Uncompressed-Domain Watermarked Videos. IEEE Transactions on Information Forensics and Security, Vol. 14, 6 (2019), 1432--1444.
[21]
A. Mohanarathinam, S. Kamalraj, Gkdp Venkatesan, R. V. Ravi, and C. S. Manikandababu. 2020. Digital Watermarking Techniques for Image Security: A Review. Journal of Ambient Intelligence and Humanized Computing, Vol. 11 (2020), 3221--3229.
[22]
H. Pan, X. You, S. Liu, and D. Zhang. 2021. Pearson Correlation Coefficient-Based Pheromone Refactoring Mechanism for Multi-Colony Ant Colony Optimization. Applied Intelligence, Vol. 51, 2 (2021), 752--774.
[23]
R. Patel, K. Lad, and M. Patel. 2021. Study and Investigation of Video Steganography Over Uncompressed and Compressed Domain: A Comprehensive Review. Multimedia Systems (2021), 1--40.
[24]
C. Pei, D. Fan, and M. Ni. 2020. An Improved Security Scheme of Big Data Circulation and Sharing. Cyberspace Security, Vol. 11, 10 (2020), 12--17.
[25]
A. K. Sahu and M. Sahu. 2020. Digital Image Steganography and Steganalysis: A Journey of the Past Three Decades. Open Computer Science, Vol. 10, 1 (2020), 1--47.
[26]
A. K. Singh, S. Thakur, A. Jolfaei, G. Srivastava, M. D. Elhoseny, and A. Mohan. 2021. Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents. ACM Transactions on Internet Technology, Vol. 21, 1 (2021), 1--20.
[27]
L. Wang. 2021. F-Scheme. https://github.com/lyonwong1982/F-scheme Retrieved March 3, 2022 from
[28]
L. Wang, J. Liu, and W. Liu. 2021. Staged Data Delivery Protocol: A Blockchain-Based Two-Stage Protocol for Non-Repudiation Data Delivery. Concurrency and Computation: Practice and Experience, Vol. 33, 13 (2021), 1--20.
[29]
L. Wang, J. Liu, W. Liu, and C. Wang. 2020. Blockchain-Based Diversion-Point System for Balancing Customer Flow in Shopping Mall. Symmetry, Vol. 12, 12 (2020), 1--25.
[30]
Y. Xiong and Y. Zhu. 2018. Data Box: A Novel Data Model for Self-Governing Openness of Data. Big Data Research (2018), 21--30.
[31]
M. Yamaç, M. Ahishali, N. Passalis, J. Raitoharju, B. Sankur, and M. Gabbouj. 2021. Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding. IEEE Transactions on Information Forensics and Security, Vol. 16 (2021), 1014--1028.
[32]
Z. Yang, Y. Huang, X. Li, and W. Wang. 2018. Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing. Computers Materials & Continua, Vol. 56, 1 (2018), 1--17.
[33]
L. Y. Zhang, Y. Zheng, J. Weng, C. Wang, Z. Shan, and K. Ren. 2020. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Transactions on Dependable and Secure Computing, Vol. 17, 6 (2020), 1218--1231.
[34]
L. H. Zhu, Y. L. Wu, K. K. Gai, and K. K. R. Choo. 2019 a. Controllable and Trustworthy Blockchain-Based Cloud Data Management. Future Generation Computer Systems, Vol. 91 (2019), 527--535.
[35]
P. Zhu, G. Xiang, W. Song, A. Li, Y. Zhang, and R. Tao. 2016. A Text Zero-Watermarking Algorithm Based on Chinese Phonetic Alphabets. Wuhan University Journal of Natural Sciences, Vol. 21, 4 (2016), 277--282.
[36]
Y. Zhu and Y. Xiong. 2021. Data-Oriented Open Sharing Based Operation System Data Module, Has Basic Component Unit for Providingdata User, and Data Users Used to Calculate Data Box Number and Time, and Pricing According to Data Usersrequirements and Goals. Patent for Invention CN107633181-A, CN107633181-B (2021).
[37]
Y. Zhu, Y. Xiong, T. Tao, Y. Zhao, W. Zhao, Y. Wu, and M. Qin. 2019 b. Block Chain Based Data Box Configuration, Usage and Billing Method, Involves Invoking Intelligent Contract to Transmit Content to Block Chain, and Calculating Blocks in Data Box Usage Record to Finish Information Storing Process. Patent for Invention CN109829334-A (2019).

Cited By

View all
  • (2023)RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchainRCDS: 一种基于符号映射编码和区块链的可确权数据共享模型Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.220065924:8(1194-1213)Online publication date: 30-Aug-2023

Index Terms

  1. T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    BSCI '22: Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure
    May 2022
    153 pages
    ISBN:9781450391757
    DOI:10.1145/3494106
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 May 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. data delivery
    3. data sharing
    4. non-repudiation
    5. symbol mapping
    6. traitor tracing
    7. watermarking

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ASIA CCS '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 44 of 12 submissions, 367%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchainRCDS: 一种基于符号映射编码和区块链的可确权数据共享模型Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.220065924:8(1194-1213)Online publication date: 30-Aug-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media