
@Article{jihpp.2021.026606,
AUTHOR = {Tao Chen, Zhao Qiu, Gengquan Xie, Lin Yuan, Shaohua Duan, Hao Guo, Dahao Fu, Hancheng Huang},
TITLE = {A Image Copyright Protection Method Using Zero-Watermark by Blockchain  and IPFS},
JOURNAL = {Journal of Information Hiding and Privacy Protection},
VOLUME = {3},
YEAR = {2021},
NUMBER = {3},
PAGES = {131--142},
URL = {http://www.techscience.com/jihpp/v3n3/46708},
ISSN = {2637-4226},
ABSTRACT = {Behind the popularity of multimedia technology, the dispute over 
image copyright is getting worse. In the digital watermark prevention technology 
for copyright infringement, watermark technology is considered to be an 
important technology to overcome data protection problems and verify the 
relationship between data ownership. Among the many digital watermarking 
technologies, zero watermarking technology has been favored in recent years. 
However, the existing zero watermark technology in the implementation process 
often needs a trusted third party to store watermarks, which may make the data 
too central, data storage security is low and copyright registration costs are too 
high, which creates a rare problem. The decentivization and information cannot 
be tampered of blockchain technology’s nature find new methods for image 
copyright protection. This paper studies the role of zero watermark algorithm in 
the image copyright and its complete storage and certification scheme, proposes 
a zero watermark image protection framework based on blockchain, and builds a 
system according to the framework. Combined with blockchain and zero 
watermarking technology, the framework uses inter IPFS (Inter Planetary File 
System) to solve the problem of blockchain efficient storage and sharing of large 
files. In addition, the application of user copyright information, image image 
query and image trading in the system are realized based on smart contracts, 
which solves the problem of lack of trusted third parties. Experiments show that 
the scheme is feasible and robust to various attacks.},
DOI = {10.32604/jihpp.2021.026606}
}



