skip to main content
10.1145/3670105.3670115acmotherconferencesArticle/Chapter ViewAbstractPublication PagescniotConference Proceedingsconference-collections
research-article

Image data confirmation method based on security watermarking and blockchain

Published: 29 July 2024 Publication History

Abstract

Aiming at the problem of unclear resource ownership and difficult definition of image data security sharing technology, combined with blind watermarking technology, this paper proposes a method of image data rights confirmation based on security watermarking and block chain to realize the security of image data rights confirmation in the flow process and ensure the integrity of the image. Firstly, SM2 digital signature algorithm is used to sign the identity information of image data holder to realize the identity authentication of data. At the same time, SM4 is used to encrypt the relevant information to realize the encrypted transmission of the information in the watermark. Upload the hash value of the watermark to the blockchain to ensure that the watermark information cannot be tampered with; Then, the watermark embedding and extraction algorithm based on discrete wavelet transform and singular value decomposition (DWT-SVD) is used to ensure the concealment of the information flow. Finally, compared with the existing right confirmation methods, it is verified that the proposed method has certain advantages of security and concealment, and can meet the needs of privacy protection and traceability.

References

[1]
Guo Bing Li Qiang Duan Xuliang - Shen Yuncheng - Dong Xiangqian - Zhang Hong.& Luo Jian. Personal Data Bank – A New Model of Personal Data Asset Management and Value-added Services based on Bank architecture D-Journal of Computer Science 40(126).
[2]
Frattolillo F, Landolfi F. A cluster grids based platform for digital copyright protection[A]. 2010 12th IEEE International Symposium on Web Systems Evolution (WSE)[C]. 2010: 83–87.
[3]
Zhang R, Zhang L, Choo K-K R. Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(1): 492–505.
[4]
Barni M, Bartolini F. Data hiding for fighting piracy[J]. IEEE Signal Processing Magazine, 2004, 21(2): 28–39.
[5]
Wang Hailong, TIAN Youliang, Yin Xin. Big Data ownership determination Scheme based on blockchain [J]. Computer Science, 2018.
[6]
Zhang Wenbo, Wang Tao, Yang Bo, Li Haiyu & Zhang Wenzheng. Block chain-based digital image batch rights confirmation and fair transaction method [0].Acta Cryptologica Sinica.:9(851)
[7]
Wang L, Huang S, Zuo L. RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain[J]. Frontiers of Information Technology & Electronic Engineering, 2023, 24(8): 1194–1213.
[8]
Qiao Rui Cao Yan & Wang Qingxian. Dynamic data traceability mechanism of Internet of Things based on alliance chain [J]. Journal of Software, 2019,30(1614-1631).
[9]
Li Li - Zhou Siqin Liu Qin &- He Debiao. Blockchain-based digital rights trading system [Knife - Journal of Network and Information Security: 4 (22).
[10]
Zhu Congxu. Multi-functional watermarking for image copyright notification, protection and content authentication [D. Journal of Communications,2009,30
[11]
Huang Qinlong, Ma Zhaofeng, Fu Jingyi, Yang Yixian & Niu Xinxin. Digital Copyright protection Scheme supporting Privacy Protection in Cloud Computing Environment [D. Journal of Communications,35(95).
[12]
Zhang L, Chen Y, Luo Y. Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment[J]. Applied Sciences, 2023.
[13]
Benoraira A, Benmahammed K, Boucenna N. Blind image watermarking technique based on differential embedding in DWT and DCT domains[J]. EURASIP Journal on Advances in Signal Processing, 2015, 2015(1): 55.
[14]
Fan K, Pan Q, Zhang K. A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5826–5835.
[15]
Liu Y, Zhang Y, Yang Y. DOCS: A Data Ownership Confirmation Scheme for Distributed Data Trading[J]. Systems, 2022, 10(6).
[16]
Zaghloul E, Zhou K, Ren J. P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing[J]. IEEE Transactions on Big Data, 2020, 6(4): 804–815.
[17]
Rial A, Deng M, Bianchi T A Provably Secure Anonymous Buyer–Seller Watermarking Protocol[J]. Information Forensics and Security, IEEE Transactions on, 2011, 5: 920–931.
[18]
Run R-S, Horng S-J, Lai J-L. An improved SVD-based watermarking technique for copyright protection[J]. Expert Systems with Applications, 2012, 39(1): 673–689.
[19]
Gao Z. Data Right Confirmation Mechanism Based on Blockchain and Locality Sensitive Hashing[J]. 2020: 0–6.
[20]
Liu X-L, Lin C-C, Yuan S-M. Blind Dual Watermarking for Color Images’ Authentication and Copyright Protection[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2018, 28(5): 1047–1055.
[21]
Zha C, Yin H, Yin B. Data Ownership Confirmation and Privacy-Free Search for Blockchain-Based Medical Data Sharing[A]. Z. Zheng, H.-N. Dai, X. Fu. Blockchain and Trustworthy Systems[C]. Singapore: Springer Singapore, 20

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CNIOT '24: Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things
May 2024
668 pages
ISBN:9798400716751
DOI:10.1145/3670105
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 July 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CNIOT 2024

Acceptance Rates

Overall Acceptance Rate 39 of 82 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 17
    Total Downloads
  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media