The Multimedia Blockchain: A Distributed and Tamper-Proof Media Transaction Framework

被引:0
|
作者
Bhowmik, Deepayan [1 ]
Feng, Tian [2 ]
机构
[1] Sheffield Hallam Univ, Dept Comp, Sheffield S1 1WB, S Yorkshire, England
[2] Univ Sheffield, Dept Elect & Elect Engn, Sheffield S1 4DE, S Yorkshire, England
来源
2017 22ND INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP) | 2017年
基金
英国工程与自然科学研究理事会;
关键词
WATERMARKING SCHEME;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A distributed and tamper proof media transaction framework is proposed based on the blockchain model. Current multimedia distribution does not preserve self-retrievable information of transaction trails or content modification histories. For example, digital copies of valuable artworks, creative media and entertainment contents are distributed for various purposes including exhibitions, gallery collections or in media production workflow. Original media is often edited for creative content preparation or tampered with to fabricate false propaganda over social media. However there is no existing trusted mechanism that can easily retrieve either the transaction trails or the modification histories. We propose a novel watermarking based Multimedia Blockchain framework that can address such issues. The unique watermark information contains two pieces of information: a) a cryptographic hash that contains transaction histories (blockchain transactions log) and b) an image hash that preserves retrievable original media content. Once the watermark is extracted, first part of the watermark is passed to a distributed ledger to retrieve the historical transaction trail and the latter part is used to identify the edited / tampered regions. The paper outlines the requirements, the challenges and demonstrates the proof of this concept.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A Fragile Watermarking Scheme for Tamper-Proof of Web Pages
    Long, Xianzhong
    Peng, Hong
    Zhang, Changle
    Pan, Zheng
    Wu, Ying
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 155 - 158
  • [42] ON KEY AGREEMENT PROTOCOLS BASED ON TAMPER-PROOF HARDWARE
    ZHENG, YL
    INFORMATION PROCESSING LETTERS, 1995, 53 (01) : 49 - 54
  • [43] Coherent Minimisation: Towards efficient tamper-proof compilation
    Ghica, Dan R.
    Al-Zobaidi, Zaid
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (104): : 83 - 98
  • [44] Tamper-Proof Privacy Auditing for Artificial Intelligence Systems
    Sutton, Andrew
    Samavi, Reza
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 5374 - 5378
  • [45] Algorithmic Tamper-Proof Security under Probing Attacks
    Liu, Feng-Hao
    Lysyanskaya, Anna
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 106 - 120
  • [46] SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance
    Fernando, Dinuni
    Kulshrestha, Siddharth
    Herath, J. Dinal
    Mahadik, Nitin
    Ma, Yanzhe
    Bai, Changxin
    Yang, Ping
    Yan, Guanhua
    Lu, Shiyong
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 81 - 90
  • [47] A Study and Design on Web Page Tamper-Proof Technology
    Hu Hong-xin
    ADVANCES IN INTELLIGENT SYSTEMS, 2012, 138 : 215 - 220
  • [48] Tamper-proof Incentive Scheme for Mobile Crowdsensing Systems
    Calado, Diogo
    Pardal, Miguel L.
    2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
  • [49] A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware
    Ding, Ning
    Gu, Dawu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 401 - 416
  • [50] Tamper-proof operating system for biometric ID Tokens
    Sanchez-Reillo, R
    Vazquez-Navarro, A
    Liu-Jimenez, J
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 319 - 324