scholarly journals A Watermarking Protocol Based on Blockchain

2020 ◽  
Vol 10 (21) ◽  
pp. 7746
Author(s):  
Franco Frattolillo

Digital watermarking can be used to implement mechanisms aimed at protecting the copyright of digital content distributed on the Internet. Such mechanisms support copyright identification and content tracking by enabling content providers to embed perceptually invisible watermarks into the distributed copies of content. They are employed in conjunction with watermarking protocols, which define the schemes of the web transactions by which buyers can securely purchase protected digital content distributed by content providers. In this regard, the “buyer friendly” and “mediated” watermarking protocols can ensure both a correct content protection and an easy participation of buyers in the transactions by which to purchase the distributed content. They represent a valid alternative to the classic “buyer and seller” watermarking protocols documented in the literature. However, their protection schemes could be further improved and simplified. This paper presents a new watermarking protocol able to combine the “buyer friendly” and “mediated” design approach with the blockchain technology. The result is a secure protocol that can support a limited and balanced participation of both buyers and content providers in the purchase transactions of protected digital content. Moreover, the protocol can avoid the direct involvement of trusted third parties in the purchase transactions. This can reduce the actual risk that buyers or sellers can violate the protocol by illicitly interacting with trusted third parties. In fact, such peculiarities make the proposed protocol suited for the current web context.

Author(s):  
Andre P. Calitz ◽  
Jean H. Greyling ◽  
Steve Everett

Post-trade securities settlements entered the electronic age between 1980 and 2000. The introduction of technologies such as secure electronic messaging, and improvements in database technology, enabled the inception of central securities depositories (CSDs) as trusted third parties or intermediaries within the securities settlements post-trade landscape. The study reported in this chapter has a focus on CSDs and the application of the blockchain technology to securities settlements. The objective is to develop a model for securities settlements using blockchain technology for a CSD, as currently, globally, no CSD has introduced a production-ready blockchain-based solution for securities settlements. A conceptual model was created from the reported literature that was evaluated by international post-trade securities professionals. The findings have resulted in the acceptance of the main components of the model, with a focus on the cost of the solution, and with the identification of prerequisites to such a solution (e.g., legal/regulatory enablement).


2020 ◽  
Vol 11 (1) ◽  
pp. 1
Author(s):  
Amna Qureshi ◽  
David Megías Jiménez

In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used. A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital watermarking and fingerprinting (or transaction tracking), and performance criteria. The study of the literature reveals that there is currently no complete and systematic taxonomy dedicated to blockchain-based copyright protection applications. Moreover, the number of successfully developed blockchain-based content protection systems is very low. This points towards a research gap. To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection systems. Furthermore, the paper discusses some technical challenges and outlines future research directions.


2020 ◽  
Vol 88 ◽  
pp. 66-82
Author(s):  
Regina Varnienė-Janssen ◽  
Albertas Šermokas

 Web technologies are the key for the implementing and ensuring the full range of user needs in the digital age. On the other hand, the issue of unified representation of digital content from diverse memory institutions in order to ensure semantic integrity still remains a matter of urgency. Semantic interoperability of information and data is essential in an integrated system. In this paper, we analyze and describe an ontology-based metadata interoperability approach and how this approach could be applied for memory institution data from diverse sources which do not support ontologies. In particular, we describe the use of the CIDOC CRM ontology as a mediating schema within Lithuania’s Information System of the Virtual Electronic Heritage (hereinafter ”VEPIS”) The paper introduces the role of the CIDOC CRM based Thesaurus of Personal Names, Geographical Names and Historical Chronology (hereinafter “BAVIC”), which operates as a core ontology within VEPIS by allowing to understand things and relationships between things as well as identify the time and space of things. The paper also focuses on trust of the cultural information on the Web. Users make trust judgments based on provenance that may or may not be explicitly offered to them. In particular, we describe how provenance is managed within digital preservation and access processes within VEPIS and define whether this management meets the W3C Provenance Incubator Group’s Requirements for Provenance on the Web. The paper is based on the results of the research initiated in 2018–2019 at the Faculty of Communication and the Faculty of Mathematics and Informatics of Vilnius University by authors of this paper.


Author(s):  
M. Monsignori ◽  
P. Nesi ◽  
M. Spinu

Content protection for multimedia data is widely recognized especially for data types that are frequently distributed, sold or shared in digital and via Internet. Particularly, the music industry dealing with audio files realized the necessity for content protection. Distribution of music sheets will face the same problems. Digital watermarking techniques provide a certain level of protection for music sheets. Classical image-oriented watermarking algorithms for images suffer from several drawbacks when directly applied to image representations of music sheets. Therefore, new solutions have been developed which are designed regarding the content of the music sheets. In comparison to other media types, the development of watermarking algorithms for music scores is a rather young technology. The chapter reviews the evolution of the early approaches and describes the current state of the art in the field.


Author(s):  
Brij B. Gupta ◽  
Somya Rajan Sahoo ◽  
Prashant Chugh ◽  
Vijay Iota ◽  
Anupam Shukla

In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright. For copyright protection, authentication purpose and forgery detection digital watermarking is the robust way in social network content protection. In this technique, the privacy information is embedded inside the multimedia content like image and video. The protected content embedded inside multimedia content is called watermark-enabled information. To make more effective the process of watermarking, the content encrypted before embedding to the image. Basically, the digital watermarking embedded process implemented in two different domains called spatial and frequency domain. In spatial domain digital watermarking, the watermark information is embedded in the least significant bit of the original image on the basis of bit plane selected and on the basis of the pixels of image, embedding, and detection is performed.


Author(s):  
Igor Titov ◽  
Evgeny Titov

Most of currently existing laboratory servers of remote labs were built fully or partially with LabVIEW programming language from National Instruments. While proving to be the best tool for fast development of excellent SCADA and data acquisition applications, it appeared to be inadequate when it comes to deploying an application to the web. This paper will analyze the tools that can be used for accomplishing this task in the remote laboratories. Various National Instruments and third parties technologies will be compared. It will be shown that LabVIEW application serving as laboratory server can easily be deployed on the standard pluginless web-page without any modifications in LabVIEW code with WebPager.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2913 ◽  
Author(s):  
MyeongHyun Kim ◽  
SungJin Yu ◽  
JoonYoung Lee ◽  
YoHan Park ◽  
YoungHo Park

In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are difficult to share on the different medical platforms. Recently, blockchain technology is one of the popular alternatives to enable medical service centers based on different platforms to share EHRs. However, it is hard to store whole EHR data in blockchain because of the size and the price of blockchain. To resolve this problem, cloud computing is considered as a promising solution. Cloud computing offers advantageous properties such as storage availability and scalability. Unfortunately, the EHR system with cloud computing can be vulnerable to various attacks because the sensitive data is sent over a public channel. We propose the secure protocol for cloud-assisted EHR system using blockchain. In the proposed scheme, blockchain technology is used to provide data integrity and access control using log transactions and the cloud server stores and manages the patient’s EHRs to provide secure storage resources. We use an elliptic curve cryptosystems (ECC) to provide secure health data sharing with cloud computing. We demonstrate that the proposed EHR system can prevent various attacks by using informal security analysis and automated validation of internet security protocols and applications (AVISPA) simulation. Furthermore, we prove that the proposed EHR system provides secure mutual authentication using BAN logic analysis. We then compare the computation overhead, communication overhead, and security properties with existing schemes. Consequently, the proposed EHR system is suitable for the practical healthcare system considering security and efficiency.


Sign in / Sign up

Export Citation Format

Share Document