skip to main content
10.1145/3568562.3568575acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protection

Published:01 December 2022Publication History

ABSTRACT

Digital contents have become more popular and rapid in recent years. The need of techniques for digital content protection is also quickly required. Various watermarking techniques are proposed for protecting the digital contents. Blockchain technology has also become very popular and applied on many solutions. This paper proposes a new hybrid model based on the combination of blockchain and watermarking method. The main purpose is not only to achieve the goal of image copyright protection but also store the image into the blockchain network. Since our proposed method employs the blockchain mechanism, the digital contents authentication algorithm does not need any third party to join and confirm. Our experimental results show that the our method successfully achieved the purpose of digital copyright protection.

References

  1. Jobin Abraham and Varghese Paul. 2019. An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University - Computer and Information Sciences 31, 1(2019), 125–133. https://doi.org/10.1016/j.jksuci.2016.12.004Google ScholarGoogle ScholarCross RefCross Ref
  2. Md. Asikuzzaman and Mark R. Pickering. 2018. An Overview of Digital Video Watermarking. IEEE Transactions on Circuits and Systems for Video Technology 28, 9(2018), 2131–2153. https://doi.org/10.1109/TCSVT.2017.2712162Google ScholarGoogle ScholarCross RefCross Ref
  3. B. Badr, R. Horrocks, and X. Wu. 2018. Blockchain by Example: A Developer’s Guide to Creating Decentralized Applications Using Bitcoin, Ethereum, and Hyperledger. Packt Publishing. https://books.google.com.vn/books?id=PzmoswEACAAJGoogle ScholarGoogle Scholar
  4. Abdullah Bamatraf, Rosziati Ibrahim, and Mohd. Najib B. Mohd Salleh. 2010. Digital watermarking algorithm using LSB. In 2010 International Conference on Computer Applications and Industrial Electronics. 155–159. https://doi.org/10.1109/ICCAIE.2010.5735066Google ScholarGoogle ScholarCross RefCross Ref
  5. Mahbuba Begum and Mohammad Shorif Uddin. 2020. Digital Image Watermarking Techniques: A Review. Information 11, 2 (2020). https://doi.org/10.3390/info11020110Google ScholarGoogle Scholar
  6. Juan Benet. 2014. IPFS - Content Addressed, Versioned, P2P File System. https://doi.org/10.48550/ARXIV.1407.3561Google ScholarGoogle Scholar
  7. cbc.ca. 2009. The pros, cons, and future of DRM. https://www.cbc.ca/news/science/the-pros-cons-and-future-of-drm-1.785237. Accessed: 2022-07-20.Google ScholarGoogle Scholar
  8. Morris Dworkin, Elaine Barker, James Nechvatal, James Foti, Lawrence Bassham, E. Roback, and James Dray. 2001. Advanced Encryption Standard (AES). https://doi.org/10.6028/NIST.FIPS.197Google ScholarGoogle ScholarCross RefCross Ref
  9. Sabah Karri Gaid and Khalid Kadhim Jabbar. 2021. Frequency Domain for Color Image Authentication Proofing. Journal of Physics: Conference Series 1963, 1 (jul 2021), 012094. https://doi.org/10.1088/1742-6596/1963/1/012094Google ScholarGoogle ScholarCross RefCross Ref
  10. Munetoshi Iwakiri and Ta Minh Thanh. 2012. Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression. In 2012 IEEE 26th International Conference on Advanced Information Networking and Applications. 755–762. https://doi.org/10.1109/AINA.2012.111Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Munetoshi Iwakiri and Ta Minh Thanh. 2012. Incomplete Cryptography Method Using Invariant Huffman Code Length to Digital Rights Management. In 2012 IEEE 26th International Conference on Advanced Information Networking and Applications. 763–770. https://doi.org/10.1109/AINA.2012.112Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. J. Jereesha Mary, S. Sebastin Antony Joe, and Mohammed Siddique. 2018. IRDM watermarking with EMRC6 encryption for DRM system. In 2018 Majan International Conference (MIC). 1–5. https://doi.org/10.1109/MINTC.2018.8363157Google ScholarGoogle ScholarCross RefCross Ref
  13. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. 1–9. Available at https://bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  14. Phuong Thi Nha, Ta Minh Thanh, and Nguyen Tuan Phong. 2022. Consideration of a Robust Watermarking Algorithm for Color Image Using Improved QR Decomposition. Soft Comput. 26, 11 (jun 2022), 5069–5093. https://doi.org/10.1007/s00500-022-06975-3Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Thottempudi Pardhu and Bhaskara Rao Perli. 2016. Digital image watermarking in frequency domain. In 2016 International Conference on Communication and Signal Processing (ICCSP). 0208–0211. https://doi.org/10.1109/ICCSP.2016.7754123Google ScholarGoogle ScholarCross RefCross Ref
  16. Muhammad Khairi Abdul Razak, Kamilah Abdullah, and Suhaila Abd Halim. 2021. A Review On Digital Image Watermarking With Cryptosystem Techniques. In 2021 IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). 383–387. https://doi.org/10.1109/ISCAIE51753.2021.9431809Google ScholarGoogle ScholarCross RefCross Ref
  17. Rohit Srivastava, Ravi Tomar, Maanak Gupta, Anuj Kumar Yadav, and Jaehong Park. 2021. Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information 12, 8 (2021). https://doi.org/10.3390/info12080310Google ScholarGoogle Scholar
  18. Karimshah Sultan, Umar Ruhi, and Rubina Lakhani. 2018. Conceptualizing Blockchains: Characteristics & Applications. ArXiv abs/1806.03693(2018).Google ScholarGoogle Scholar
  19. Ta Minh Thanh and Munetoshi Iwakiri. 2014. A Proposal of Digital Rights Management Based on Incomplete Cryptography Using Invariant Huffman Code Length Feature. Multimedia Syst. 20, 2 (mar 2014), 127–142. https://doi.org/10.1007/s00530-013-0327-zGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ta Minh Thanh and Munetoshi Iwakiri. 2016. Fragile Watermarking with Permutation Code for Content-Leakage in Digital Rights Management System. Multimedia Syst. 22, 5 (oct 2016), 603–615. https://doi.org/10.1007/s00530-015-0472-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ta Minh Thanh and Keisuke Tanaka. 2014. A proposal of novel q-DWT for blind and robust image watermarking. In 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC). 2061–2065. https://doi.org/10.1109/PIMRC.2014.7136511Google ScholarGoogle ScholarCross RefCross Ref
  22. Ta Minh Thanh and Keisuke Tanaka. 2015. Blind Watermarking using QIM and the Quantized SVD Domain based on the q-Logarithm Function. In VISAPP 2015 - Proceedings of the 10th International Conference on Computer Vision Theory and Applications, Volume 3, Berlin, Germany, 11-14 March, 2015, José Braz, Sebastiano Battiato, and Francisco H. Imai (Eds.). SciTePress, 14–25. https://doi.org/10.5220/0005291900140025Google ScholarGoogle ScholarCross RefCross Ref
  23. Ta Minh Thanh and Nguyen Trung Thanh. 2015. Extended DCT Domain for Improving the Quality of Watermarked Image. In 2015 Seventh International Conference on Knowledge and Systems Engineering (KSE). 336–339. https://doi.org/10.1109/KSE.2015.70Google ScholarGoogle Scholar
  24. Tony Thomas, Sabu Emmanuel, A. V. Subramanyam, and Mohan S. Kankanhalli. 2009. Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture. IEEE Transactions on Information Forensics and Security 4, 4(2009), 758–767. https://doi.org/10.1109/TIFS.2009.2033229Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SoICT '22: Proceedings of the 11th International Symposium on Information and Communication Technology
    December 2022
    474 pages
    ISBN:9781450397254
    DOI:10.1145/3568562

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 December 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate147of318submissions,46%
  • Article Metrics

    • Downloads (Last 12 months)33
    • Downloads (Last 6 weeks)3

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format