skip to main content
research-article

Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks

Published:04 March 2022Publication History
Skip Abstract Section

Abstract

Copyright protection in multimedia protection distribution is a challenging problem. To protect multimedia data, many watermarking methods have been proposed in the literature. However, most of them cannot be used effectively in a multimedia distribution network (MDN) as they are not designed to support multi-layer watermark embedding. Multi-layer watermarking mechanisms were developed to protect multimedia data across different layers in an MDN. However, in those mechanisms, we need to trust the entities in the MDN, such as regional and country distributors. To overcome this potential drawback, in this article, we propose a novel privacy protection mechanism for MDNs by combining the advantages of both blockchain and watermarking technologies. A specifically designed watermarking algorithm is used to link the copyright information with the audio file, while a novel blockchain-based smart contract mechanism is developed to enforce the proper functioning of each entity in the distribution network. Moreover, the new audio mechanism is computationally efficient. Although audio signals are used to show the effectiveness of the proposed mechanism, the proposed approach can easily be extended to other multimedia objects, such as an image. The validity of the proposed mechanism is demonstrated by our simulation results. The proposed mechanism can benefit multimedia production companies and other entities in the MDN.

REFERENCES

  1. [1] 2021. Etherscan — The Ethereum Blockchain Explorer. Retrieved November 28, 2021 from https://etherscan.io/.Google ScholarGoogle Scholar
  2. [2] 2021. Inter Planetary File System. Retrieved November 28, 2021 from https://ipfs.io/.Google ScholarGoogle Scholar
  3. [3] 2021. Solidity Language. Retrieved November 28, 2021 from https://soliditylang.org/.Google ScholarGoogle Scholar
  4. [4] 2021. Truffle Suite — Tools for Smart Contracts. https://www.trufflesuite.com/.Google ScholarGoogle Scholar
  5. [5] Agyekum Kwame Opuni-Boachie Obour, Xia Qi, Liu Yansong, Pu Hong, Cobblah Christian Nii Aflah, Kusi Goodlet Akwasi, Yang Hanlin, and Gao Jianbin. 2019. Digital copyright and content protection using IPFS and blockchain. In Proceedings of the International Conference on Image and Graphics. Springer, Beijing, China, 266277.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Bhowmik Deepayan and Feng Tian. 2017. The multimedia blockchain: A distributed and tamper-proof media transaction framework. In Proceedings of the 22nd International Conference on Digital Signal Processing (DSP’17). IEEE, London, UK, 15.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Chen Oscal T.-C. and Wu Wen-Chih. 2008. Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Transactions on Audio, Speech, and Language Processing 16, 3 (2008), 629638.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] ITU-T, R. 2001. Methods for objective measurements of perceived audio quality. standard. International Telecommunication Union, Geneva, Switzerland.Google ScholarGoogle Scholar
  9. [9] Cox Ingemar J., Kilian Joe, Leighton F. Thomson, and Shamoon Talal. 1997. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 12 (1997), 16731687.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Chris Dannen. 2017. Introducing Ethereum and Solidity. Apress, Berkeley, CA. .Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Hu Peng, Peng Dezhong, Yi Zhang, and Xiang Yong. 2016. Robust time-spread echo watermarking using characteristics of host signals. Electronics Letters 52, 1 (2016), 56.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Kalantari Nima Khademi, Akhaee Mohammad Ali, Ahadi Seyed Mohammad, and Amindavar Hamidreza. 2009. Robust multiplicative patchwork method for audio watermarking. IEEE Transactions on Audio, Speech, and Language Processing 17, 6 (2009), 11331141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Kang Hyunho, Yamaguchi Koutarou, Kurkoski Brian, Yamaguchi Kazuhiko, and Kobayashi Kingo. 2008. Full-index-embedding patchwork algorithm for audio watermarking. IEICE Transactions on Information and Systems 91, 11 (2008), 27312734.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Kim Hyoung Joong and Choi Yong Hee. 2003. A novel echo-hiding scheme with backward and forward kernels. IEEE Transactions on Circuits and Systems for Video Technology 13, 8 (2003), 885889.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Kirbiz Serap and Gunsel Bilge. 2006. Robust audio watermark decoding by supervised learning. In Proceedings of the 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5. IEEE, Toulouse, France, 761764.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Kirovski Darko and Malvar Henrique S.. 2003. Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing 51, 4 (2003), 10201033.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Kishigami Junichi, Fujimura Shigeru, Watanabe Hiroki, Nakadaira Atsushi, and Akutsu Akihiko. 2015. The blockchain-based digital content distribution system. In Proceedings of the IEEE 5th International Conference on Big Data and Cloud Computing. IEEE, Dalian, China, 187190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Ko Byeong-Seob, Nishimura Ryouichi, and Suzuki Yôiti. 2005. Time-spread echo method for digital audio watermarking. IEEE Transactions on Multimedia 7, 2 (2005), 212221.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Kushwaha Satish Chandra, Das Pallavi, and Chakraborty Madhuparna. 2015. Multiple watermarking on digital audio based on DWT technique. In Proceedings of the International Conference on Communications and Signal Processing (ICCSP’15). IEEE, 03030307.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Lakshmi D., Ganesh R., Marni Srihari Rao, Prakash R., and Arulmozhivarman P.. 2008. SVM based effective watermarking scheme for embedding binary logo and audio signals in images. In Proceedings of the IEEE Region 10 Conference (TENCON’08). IEEE, Hyderabad, India, 15.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Li Ming, Zeng Leilei, Zhao Le, Yang Renlin, An Dezhi, and Fan Haiju. 2021. Blockchain-watermarking for compressive sensed images. IEEE Access 9 (2021), 5645756467.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Liu Jianxing, Fan Kai, Li Hui, and Yang Yintang. 2021. A blockchain-based privacy preservation scheme in multimedia network. Multimedia Tools and Applications (2021), 115.Google ScholarGoogle Scholar
  23. [23] Ma Zhaofeng, Huang Weihua, and Gao Hongmin. 2018. A new blockchain-based trusted DRM scheme for built-in content protection. EURASIP Journal on Image and Video Processing 2018, 1 (2018), 112.Google ScholarGoogle Scholar
  24. [24] Malvar Henrique S. and Florêncio Dinei A. F.. 2003. Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51, 4 (2003), 898905.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Menezes Alfred J., Katz Jonathan, Oorschot Paul C. Van, and Vanstone Scott A.. 1996. Handbook of Applied Cryptography. CRC Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Meng Zhaoxiong, Morizumi Tetsuya, Miyata Sumiko, and Kinoshita Hirotsugu. 2018. Design scheme of copyright management system based on digital watermarking and blockchain. In Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC’18), Vol. 2. IEEE, Tokyo, Japan, 359364.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Natgunanathan Iynkaran, Xiang Yong, Hua Guang, Beliakov Gleb, and Yearwood John. 2017. Patchwork-based multilayer audio watermarking. IEEE/ACM Transactions on Audio, Speech, and Language Processing 25, 11 (2017), 21762187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Natgunanathan Iynkaran, Xiang Yong, Rong Yue, Zhou Wanlei, and Guo Song. 2012. Robust patchwork-based embedding and decoding scheme for digital audio watermarking. IEEE Transactions on Audio, Speech, and Language Processing 20, 8 (2012), 22322239.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Ogihara Akio, Murata Harumi, Iwata Motoi, and Shiozaki Akira. 2009. Multi-layer audio watermarking based on amplitude modification. In Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. ACM, Kyoto, Japan, 6871.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Qureshi Amna and Megías David. 2019. Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting. In Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC’19). IEEE, Lanzhou, China, 16061615.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Savelyev Alexander. 2018. Copyright in the blockchain era: Promises and challenges. Computer Law & Security Review 34, 3 (2018), 550561.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Stokes Simon. 2019. Digital Copyright: Law and Practice. Bloomsbury Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Tianchi Liu, Guangming Yang, and Qi Wang. 2011. A multiple audio watermarking algorithm based on shear resisting DWT and LSB. In Proceedings of the 7th International Conference on Networked Computing. IEEE, Gumi, Korea (South), 7883.Google ScholarGoogle Scholar
  34. [34] Tresise Annabel, Goldenfein Jake, and Hunter Dan. 2018. What blockchain can and can’t do for copyright. Australian Intellectual Property Journal 144, 28 (2018), 1–14.Google ScholarGoogle Scholar
  35. [35] Valizadeh Amir and Wang Z. Jane. 2010. Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Transactions on Information Forensics and Security 6, 2 (2010), 267282.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Vishwa Alka and Hussain Farookh Khadeer. 2018. A blockchain based approach for multimedia privacy protection and provenance. In Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI’18). IEEE, Bangalore, India, 19411945.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Wang Baowei, Jiawei Shi, Wang Weishen, and Zhao Peng. 2020. A blockchain-based system for secure image protection using zero-watermark. In Proceedings of the IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS’20). IEEE, 6270.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Wang Huiqin, Nishimura Ryouichi, Suzuki Yoiti, and Mao Li. 2008. Fuzzy self-adaptive digital audio watermarking based on time-spread echo hiding. Applied Acoustics 69, 10 (2008), 868874.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Wood Gavin et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 2014 (2014), 132.Google ScholarGoogle Scholar
  40. [40] Wu Ja-Ling and Shin Jiun. 1995. Discrete cosine transform in error control coding. IEEE Transactions on Communications 43, 5 (1995), 18571861.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Xiang Yong, Natgunanathan Iynkaran, Guo Song, Zhou Wanlei, and Nahavandi Saeid. 2014. Patchwork-based audio watermarking method robust to de-synchronization attacks. IEEE/ACM Transactions on Audio, Speech, and Language Processing 22, 9 (2014), 14131423.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Xiang Yong, Natgunanathan Iynkaran, Peng Dezhong, Zhou Wanlei, and Yu Shui. 2011. A dual-channel time-spread echo method for audio watermarking. IEEE Transactions on Information Forensics and Security 7, 2 (2011), 383392.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Xiang Yong, Natgunanathan Iynkaran, Rong Yue, and Guo Song. 2015. Spread spectrum-based high embedding capacity watermarking method for audio signals. IEEE/ACM Transactions on Audio, Speech, and Language Processing 23, 12 (2015), 22282237.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Xiang Yong, Peng Dezhong, Natgunanathan Iynkaran, and Zhou Wanlei. 2010. Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Transactions on Multimedia 13, 1 (2010), 213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Xu Ruzhi, Zhang Lu, Zhao Huawei, and Peng Yun. 2017. Design of network media’s digital rights management scheme based on blockchain technology. In Proceedings of the IEEE 13th International Symposium on Autonomous Decentralized System (ISADS’17). IEEE, Bangkok, Thailand, 128133.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Zhang Peng, Xu Shu-Zheng, and Yang Hua-Zhong. 2012. Robust audio watermarking based on extended improved spread spectrum with perceptual masking. International Journal of Fuzzy Systems 14, 2 (2012).Google ScholarGoogle Scholar
  47. [47] Zhang Xiaoqiang and Wang Z. Jane. 2013. Correlation-and-bit-aware multiplicative spread spectrum embedding for data hiding. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS’13). IEEE, Guangzhou, China, 186190.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Zhao Juan, Zong Tianrui, Xiang Yong, Gao Longxiang, and Beliakov Gleb. 2020. Robust blockchain-based cross-platform audio copyright protection system using content-based fingerprint. In Proceedings of the International Conference on Web Information Systems Engineering. Springer, Beijing, China, 201212.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 3
        August 2022
        478 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3505208
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 March 2022
        • Revised: 1 October 2021
        • Accepted: 1 October 2021
        • Received: 1 September 2020
        Published in tomm Volume 18, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!