A new blockchain-based trusted DRM scheme for built-in content protection

被引:32
作者
Ma Zhaofeng [1 ]
Huang Weihua [2 ]
Gao Hongmin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Shenzhen Datong Ind Co Ltd, Shenzhen 518000, Peoples R China
关键词
Digital rights management (DRM); Watermark; Blockchain; Misusing detection; IMAGE AUTHENTICATION; WATERMARKING SCHEME; COLOR IMAGES; ROBUST; SECURE; ENCRYPTION; DOMAIN;
D O I
10.1186/s13640-018-0327-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of Internet technology, transmitting, editing and misusing the digital multimedia bring great challenges in misusing detection for multimedia content protection. In this paper we proposed an artwork image digital rights management scheme for Internet misusing detection based on watermark and blockchain with robustness and high-level security. We embed artwork right information such as author, RightHolder, Date and Location information into the artwork image data. In the scheme, we use image Arnold transform to enhance the security and use image DCT coefficients of middle frequency to embed watermark for robustness. In the transparence of watermark, HVS and Watson models are used to control the watermark strength, which can enhance the invisibility. Once the suspicious image data from Internet are misused and spreading the image data on Internet without authorization, especially the high value artwork image data, we can trace the misuse responsibility by extracting the watermark. And according to the above algorithm, we implemented the scheme as DRMChain based on the consortium blockchain which stored the artwork and DRM information in an un-tampered ledger for decentralized rights confirmation. Large amount of experiments indicate the proposed watermark-based trusted blockchain DRM scheme is secure, robust, and for the protection and misuse detection of image data.
引用
收藏
页数:12
相关论文
共 23 条
[1]  
[Anonymous], 2015, P INT WORKSH OP PROB
[2]   Blind image watermarking technique based on differential embedding in DWT and DCT domains [J].
Benoraira, Ali ;
Benmahammed, Khier ;
Boucenna, Noureddine .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015,
[3]   A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images [J].
Bouslimi, Dalel ;
Coatrieux, Gouenou ;
Cozic, Michel ;
Roux, Christian .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (05) :891-899
[4]   Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (04) :728-739
[5]   Preserving robustness and removability for digital watermarks using subsampling and difference correlation [J].
Chang, Chin-Chen ;
Lin, Pei-Yu ;
Yeh, Jieh-Shan .
INFORMATION SCIENCES, 2009, 179 (13) :2283-2293
[6]   An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Zhang, Li-bo ;
Zhang, Yushu .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 23 (1-3) :294-310
[7]  
Chunhua Dong, 2012, 2012 9th Web Information Systems and Applications Conference (WISA 2012), P119, DOI 10.1109/WISA.2012.51
[8]  
Cox I, 2007, Digital watermarking and steganography
[9]   A novel blind robust image watermarking in DCT domain using. inter-block coefficient correlation [J].
Das, Chinmayee ;
Panigrahi, Swetalina ;
Sharma, Vijay K. ;
Mahapatra, K. K. .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (03) :244-253
[10]   BlockChain: A Distributed Solution to Automotive Security and Privacy [J].
Dorri, Ali ;
Steger, Marco ;
Kanhere, Salil S. ;
Jurdak, Raja .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) :119-125