Abstract
Background: With the development and innovation of digital information technologies and new-generation Internet information platforms, new types of information exchange methods have been spawned. It has broken the restriction of the traditional internet boundary, and integrated all round connections between people and objects.
Methods: Based on the above progresses, digital multimedia contents distributed or published much more convenient on the internet than before and most of them without any copyright protection. The dishonest owner can easily copy and distribute digital multimedia content without reducing any perceptual quality. According to the relative concerns, watermark protocol networks play a very important role in the usage tracking and copyrights infringement authentication, etc. However, most of the watermark protocols always require a “fully trusted third party”, which has a potential risk to suffer conspiracy attack.
Results: Therefore, in this paper, we focus on designing a watermark protocol with trustless third party via blockchain for protecting copyrights of owners that they want to publish or distribute on the internet. The proposed watermark protocol includes three sub-protocols which covers the negotiation process, transaction process and identification processes.
Conclusion: In addition, this paper also provides a fully detail analysis that describes the benefits and weaknesses of current solution.
Keywords: Watermark protocol, copyright protection, blockchain, multiparty, trustless third party, intelligence.
Graphical Abstract
[http://dx.doi.org/10.1109/TIP.2004.837553 PMID: 15575156]
[http://dx.doi.org/10.1109/TIFS.2007.903849]
[http://dx.doi.org/10.1109/MINES.2009.132]
[http://dx.doi.org/10.1109/TIFS.2010.2095844]
[http://dx.doi.org/10.1093/comjnl/bxu015]
[http://dx.doi.org/10.1080/02564602.2014.983565]
[http://dx.doi.org/10.1145/2856036]
[http://dx.doi.org/10.1109/TIFS.2010.2072830]
[http://dx.doi.org/10.1109/ACCESS.2017.2730843]
[http://dx.doi.org/10.1006/jvci.1998.0391]
[http://dx.doi.org/10.1007/978-3-540-45203-4_21]
[http://dx.doi.org/10.1016/j.jisa.2019.05.011]
[http://dx.doi.org/10.1002/sec.1690]
[http://dx.doi.org//10.1109/TIFS.2016.2590944]
[http://dx.doi.org/10.1007/s11042-016-4247-8]
[http://dx.doi.org/10.1016/j.jvcir.2012.01.017]
[http://dx.doi.org/10.1109/COMPSAC.2018.10258]
[http://dx.doi.org/10.1109/MCOM.2017.1700879]