Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (6): 1756-1765.DOI: 10.11772/j.issn.1001-9081.2024060901
• CCF BigData 2024 • Previous Articles
Li’e WANG1,2,3, Caiyi LIN1,2,3, Yongdong LI1,2,3, Xingcheng FU1,2,3(), Xianxian LI1,2,3
Received:
2024-06-28
Revised:
2024-07-26
Accepted:
2024-08-02
Online:
2024-08-19
Published:
2025-06-10
Contact:
Xingcheng FU
About author:
WANG Li’e, born in 1981, Ph. D., professor. Her research interests include data security, blockchain, recommender system, machine learning, knowledge graph.Supported by:
王利娥1,2,3, 林彩怡1,2,3, 李永东1,2,3, 傅星珵1,2,3(), 李先贤1,2,3
通讯作者:
傅星珵
作者简介:
王利娥(1981—),女,湖南邵阳人,教授,博士,CCF高级会员,主要研究方向:数据安全、区块链、推荐系统、机器学习、知识图谱基金资助:
CLC Number:
Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI. Digital content copyright protection and fair tracking scheme based on blockchain[J]. Journal of Computer Applications, 2025, 45(6): 1756-1765.
王利娥, 林彩怡, 李永东, 傅星珵, 李先贤. 基于区块链的数字内容版权保护和公平追踪方案[J]. 《计算机应用》唯一官方网站, 2025, 45(6): 1756-1765.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024060901
文献[ | |||||
文献[ | |||||
文献[ | |||||
文献[ | |||||
文献[ | |||||
本文方案 |
Tab. 1 Comparison of copyright protection schemes
文献[ | |||||
文献[ | |||||
文献[ | |||||
文献[ | |||||
文献[ | |||||
本文方案 |
方案 | 加密操作 | 嵌入操作 | 解密操作 |
---|---|---|---|
文献[ | |||
文献[ | |||
本文方案 |
Tab. 2 Computational cost comparison
方案 | 加密操作 | 嵌入操作 | 解密操作 |
---|---|---|---|
文献[ | |||
文献[ | |||
本文方案 |
加解密次数 | Paillier同态加密算法 总加解密时间/s | ECElGamal算法 总加解密时间/s |
---|---|---|
10 | 30.332 | 156.506 |
100 | 318.132 | 1 542.068 |
1 000 | 3 021.003 | 17 091.959 |
Tab. 3 Algorithm performance comparison
加解密次数 | Paillier同态加密算法 总加解密时间/s | ECElGamal算法 总加解密时间/s |
---|---|---|
10 | 30.332 | 156.506 |
100 | 318.132 | 1 542.068 |
1 000 | 3 021.003 | 17 091.959 |
子密钥大小/B | 子密钥 生成时间/ms | 密钥 恢复时间/ms | |
---|---|---|---|
(2,3) | 68 | 0.080 9 | 0.065 2 |
(3,5) | 68 | 0.112 9 | 0.083 7 |
(4,6) | 68 | 0.143 4 | 0.109 5 |
(5,8) | 68 | 0.175 2 | 0.128 4 |
(7,10) | 68 | 0.213 3 | 0.178 7 |
Tab. 4 Shamir algorithm storage overhead and performance
子密钥大小/B | 子密钥 生成时间/ms | 密钥 恢复时间/ms | |
---|---|---|---|
(2,3) | 68 | 0.080 9 | 0.065 2 |
(3,5) | 68 | 0.112 9 | 0.083 7 |
(4,6) | 68 | 0.143 4 | 0.109 5 |
(5,8) | 68 | 0.175 2 | 0.128 4 |
(7,10) | 68 | 0.213 3 | 0.178 7 |
1 | RAY A, ROY S. Recent trends in image watermarking techniques for copyright protection: a survey[J]. International Journal of Multimedia Information Retrieval, 2020, 9(4):249-270. |
2 | MIELCZAREK N, HOPKINS W W. Copyright, transformativeness, and protection for Internet memes[J]. Journalism and Mass Communication Quarterly, 2021, 98(1): 37-58. |
3 | BOUJERFAOUI S, RIAD R, DOUZI H, et al. Image watermarking between conventional and learning-based techniques: a literature review [J]. Electronics, 2022, 12(1): No.74. |
4 | HASSAN H E R, TAHOUN M, ElTAWEEL G S. A robust computational DRM framework for protecting multimedia contents using AES and ECC[J]. Alexandria Engineering Journal, 2020, 59(3): 1275-1286. |
5 | LEE C W. Multipurpose protection for numeric data with capabilities of self-authentication and ownership declaration[J]. IEEE Access, 2018, 6: 71152-71167. |
6 | FRATTOLILLO F. A multiparty watermarking protocol for cloud environments [J]. Journal of Information Security and Applications, 2019, 47: 246-257. |
7 | FATIMA M, NISAR M W, RASHID J, et al. A novel fingerprinting technique for data storing and sharing through clouds[J]. Sensors, 2021, 21(22): No.7647. |
8 | ANAND A, SINGH A K, ZHOU H. ViMDH: visible-imperceptible medical data hiding for internet of medical things[J]. IEEE Transactions on Industrial Informatics, 2023, 19(1): 849-856. |
9 | QU J. Blockchain in medical informatics[J]. Journal of Industrial Information Integration, 2022, 25: No.100258. |
10 | QIU C, YAO H, JIANG C, et al. Cloud computing assisted blockchain-enabled Internet of Things[J]. IEEE Transactions on Cloud Computing, 2022, 10(1): 247-257. |
11 | BIAN S, SHEN G, HUANG Z, et al. PABC: a patent application system based on blockchain[J]. IEEE Access, 2021, 9: 4199-4210. |
12 | HU J, ZHU P, QI Y, et al. A patent registration and trading system based on blockchain[J]. Expert Systems with Applications, 2022, 201: No.117094. |
13 | XIANG Y, REN W, LI T, et al. A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks[J]. Journal of Network and Computer Applications, 2021, 176: No.102953. |
14 | GAO J, YU H, ZHU X, et al. Blockchain-based digital rights management scheme via multiauthority ciphertext-policy attribute-based encryption and proxy re-encryption[J]. IEEE Systems Journal, 2021, 15(4): 5233-5244. |
15 | ISLAM M M, IN H P. Decentralized global copyright system based on consortium blockchain with proof of authority[J]. IEEE Access, 2023, 11: 43101-43115. |
16 | CHEN X, YANG A, WENG J, et al. A blockchain-based copyright protection scheme with proactive defense[J]. IEEE Transactions on Services Computing, 2023, 16(4): 2316-2329. |
17 | ZHUANG C, DAI Q, ZHANG Y. BCPPT: a blockchain-based privacy-preserving and traceability identity management scheme for intellectual property[J]. Peer-to-Peer Networking and Applications, 2022, 15(1): 724-738. |
18 | GUPTA P, DEDEOGLU V, KANHERE S S, et al. TrailChain: traceability of data ownership across blockchain-enabled multiple marketplaces [J]. Journal of Network and Computer Applications, 2022, 203: No.103389. |
19 | DE AGUIAR E J, DOS SANTOS A J, MENEGUETTE R I, et al. A blockchain-based protocol for tracking user access to shared medical imaging [J]. Future Generation Computer Systems, 2022, 134: 348-360. |
20 | YU F, PENG J, LI X, et al. A copyright-preserving and fair image trading scheme based on blockchain[J]. Tsinghua Science and Technology, 2023, 28(5): 849-861. |
21 | JASRA B, MOON A H. Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system[J]. Expert Systems with Applications, 2022, 206: No.117861. |
22 | LIANG X, XIANG S, YANG L, et al. Robust and reversible image watermarking in homomorphic encrypted domain [J]. Signal Processing: Image Communication, 2021, 99: No.116462. |
23 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2024-04-12].. |
24 | DINH T T A, LIU R, ZHANG M, et al. Untangling blockchain: a data processing view of blockchain systems [J]. IEEE Transactions on Knowledge and Data Engineering, 2018, 30(7): 1366-1385. |
25 | YUAN Y, WANG F Y. Blockchain and cryptocurrencies: model, techniques, and applications [J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018, 48(9): 1421-1428. |
26 | 陈晶,杨浩,何琨,等. 区块链扩展技术现状与展望[J]. 软件学报, 2024, 35(2):828-851. |
CHEN J, YANG H, HE K, et al. Current situation and prospect of blockchain scaling technology[J]. Journal of Software, 2024, 35(2): 828-851. | |
27 | 兰亚杰,马自强,陈嘉莉,等. 基于区块链的可搜索属性加密技术应用综述[J]. 计算机科学, 2024, 51(6A): No.230800016. |
LAN Y J, MA Z Q, CHEN J L, et al. Survey on application of searchable attribute-based encryption technology based on blockchain[J]. Computer Science, 2024, 51(6A): No.230800016. | |
28 | ANDREINA S, BOHLI J M, KARAME G O, et al. PoTS: a secure proof of tee-stake for permissionless blockchains [J]. IEEE Transactions on Services Computing, 2022, 15(4): 2173-2187. |
29 | LI R, SONG T, MEI B, et al. Blockchain for large-scale internet of things data storage and protection[J]. IEEE Transactions on Services Computing, 2019, 12(5): 762-771. |
30 | XU Y, ZHANG C, ZENG Q, et al. Blockchain-enabled accountability mechanism against information leakage in vertical industry services [J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2): 1202-1213. |
31 | ZHANG L Y, ZHENG Y, WENG J, et al. You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 17(6): 1218-1231. |
[1] | Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI. Privacy protection method for consortium blockchain based on SM2 linkable ring signature [J]. Journal of Computer Applications, 2025, 45(5): 1564-1572. |
[2] | Chunxia LIU, Hanying XU, Gaimei GAO, Weichao DANG, Zilu LI. Smart contract vulnerability detection method based on echo state network [J]. Journal of Computer Applications, 2025, 45(1): 153-161. |
[3] | Min SUN, Shihang JIAO, Chenyan WANG. Credit based committee consensus mechanism [J]. Journal of Computer Applications, 2025, 45(1): 170-177. |
[4] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[5] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[6] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[7] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[8] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[9] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[10] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[11] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[12] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[13] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[14] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[15] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||