A Watermarking Protocol Based on Blockchain
Abstract
:1. Introduction
2. Related Work
3. Main Challenges
4. Basics of the Protocol
5. Watermarking Protocol
5.1. Protection Protocol
- is generated depending on the specific “negotiation mechanism” chosen by among those ones supported by [4,5]. In this regard, in the proposed protocol is assumed to provide multiple negotiation mechanisms, which enable to be identified, for example, using an anonymous digital certificate or a personal digital certificate or a credit card [4,5]. In fact, the last two mechanisms enable to be directly identified. However, they are assumed to be implemented according to the concept of “multilateral security” applied to web transactions [53,54].
- is the ’s shipping address that will enable him/her to receive the secret key corresponding to the public key .
5.2. Identification and Arbitration Protocol
6. Protocol Analysis
- and cannot be corrupted.
- and can be only corrupted “statically”, i.e., the set of the corrupt entities is decided at the beginning of the protocol execution and cannot be modified throughout the execution [55].
- is assumed to be characterized by an “honest-but-curious” behavior [55]. As a consequence, is obliged to follow the rules of the protocol, even though it can try its best to get information from the executed actions. This means that cannot collude with or , and this is a reasonable assumption, since is assumed to limit its action to automatically executing a smart contract whose code is approved and accepted in advance and cannot be modified during the life of the blockchain [26,27,28,29,30].
- Uncorrupt buyers and content providers are assumed to never release pirated copies.
6.1. Assumptions
6.2. Analysis
6.2.1. is Corrupt
- 1.
- 2.
- obtain the generation of a node in the blockchain , which occurs only if can certify consistency between the security tokens sent in the messages and by and respectively (see Table 2).
- 1.
- When a key pair (,) and an encrypted nonce are employed in a valid purchase transaction, they are included and published in a node of , and can no longer be re-used, as reported in Section 5.1.
- 2.
- Once the public key has been chosen and sent to in the message , it can no longer be corrupted by , since it has to correspond to the secret key released by in the message . Therefore, if encrypts the watermark to be inserted into X using the corrupt key , it ends up generating the content . However, will employ the secret key to decrypt the received content according to the Expression (3), thus generating a protected content containing an unknown and unpredictable watermark. In fact, this just damages , which ends up releasing a piece of content including a watermark that cannot be linked to any buyer.
- 3.
- If receives the key from in the message and forwards the corrupt key to in the message , the key exchange is always disclosed by unless generates a valid signature , which, as reported above, is impossible. This is because compares the tokens received in the messages and , and generates a new node in the blockchain only if the tokens turn out to be consistent.
- 4.
- For the same reason reported at the previous point, if receives the encrypted nonce from in the message and forwards the corrupt nonce to in the message , the nonce exchange is always disclosed by unless generates a valid signature , which, as reported above, is impossible.
- cannot generate a valid signature on arbitrary security tokens;
- the security tokens that can be employed in a valid purchase transaction have to be among those ones generated by ;
- cannot reuse security tokens employed in previous purchase transactions and already published in the nodes of ;
6.2.2. is Corrupt
- 1.
- cannot autonomously generate a valid and verifiable signature on corrupt tokens.
- 2.
- is generated by to unambiguously identify the content X requested by the buyer. Therefore, uniquely accepts the content identifiers that it has generated during the initial phase of the protection protocol. No other identifiers can be accepted.
- 3.
- is always sent by to in the message , together with the corresponding signature . Therefore, if the content identifiers included in the messages and do not coincide or do not match with the signature , does not complete the purchase transaction.
7. Implementation
8. Conclusions
Funding
Acknowledgments
Conflicts of Interest
References
- Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann: Burlington, MA, USA, 2007. [Google Scholar]
- Barni, M.; Bartolini, F. Data Hiding for Fighting Piracy. IEEE Signal Process. Mag. 2004, 21, 28–39. [Google Scholar] [CrossRef]
- Gopalakrishnan, K.; Memon, N.; Vora, P.L. Protocols for watermark verification. IEEE Multimed. 2001, 8, 66–70. [Google Scholar] [CrossRef] [Green Version]
- Frattolillo, F. Watermarking protocol for web context. IEEE Trans. Inf. Forensics Secur. 2007, 2, 350–363. [Google Scholar] [CrossRef]
- Frattolillo, F. Watermarking Protocols: Problems, Challenges and a Possible Solution. Comput. J. 2015, 58, 944–960. [Google Scholar] [CrossRef]
- Trappe, W.; Wu, M.; Wang, Z.J.; Liu, K.J.R. Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 2003, 41, 1069–1087. [Google Scholar] [CrossRef] [Green Version]
- Liu, K.J.R.; Trappe, W.; Wang, Z.J.; Wu, M.; Zhao, H. Multimedia Fingerprinting Forensics for Traitor Tracing; Hindawi Publishing Corporation: New York, NY, USA, 2005. [Google Scholar]
- Pehlivanoglu, S. An Asymmetric Fingerprinting Code for Collusion-resistant Buyer-seller Watermarking. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 17–19 June 2013; ACM: New York, NY, USA, 2013; pp. 35–44. [Google Scholar]
- Kuribayashy, M.; Tanaka, H. Fingerprinting Protocol for Images Based on Additive Homomorphic Property. IEEE Trans. Image Process. 2005, 14, 2129–2139. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Memon, N.; Wong, P.W. A buyer-seller watermarking protocol. IEEE Trans. Image Process. 2001, 10, 643–649. [Google Scholar] [CrossRef]
- Lei, C.L.; Yu, P.L.; Tsai, P.L.; Chan, M.H. An Efficient and Anonymous Buyer-Seller Watermarking Protocol. IEEE Trans. Image Process. 2004, 13, 1618–1626. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Fan, C.I.; Chen, M.T.; Sun, W.Z. Buyer-Seller Watermarking Protocols with Off-line Trusted Parties. In Proceedings of the IEEE Int. Conf. on Multimedia and Ubiquitous Engineering, Seul, Korea, 26–28 April 2007; IEEE Computer Society: Washington, DC, USA, 2007; pp. 1035–1040. [Google Scholar]
- Das, V.V. Buyer-Seller Watermarking Protocol for an Anonymous Network Transaction. In Proceedings of the 1st Int. Conf. on Emerging Trends in Engineering and Technology, Nagpur, India, 16–18 July 2008; IEEE Computer Society: Washington, DC, USA, 2008; pp. 807–812. [Google Scholar]
- Laxmi, V.; Khan, M.N.; Kumar, S.S.; Gaur, M.S. Buyer seller watermarking protocol for digital rights management. In Proceedings of the 2nd Int. Conf. on Security of information and networks, Famagusta, North Cyprus, 6–10 October 2009; ACM: New York, NY, USA, 2009; pp. 298–301. [Google Scholar]
- Hu, D.; Li, Q. A secure and practical buyer-seller watermarking protocol. In Proceedings of the Int. Conf. on Multimedia Information Networking and Security, Hubei, China, 18–20 November 2009; IEEE Computer Society: Washington, DC, USA, 2009; pp. 105–108. [Google Scholar]
- Zhao, H.V.; Liu, K.J.R. Traitor-within-Traitor Behavior Forensics: Strategy and Risk Minimization. IEEE Trans. Inf. Forensics Secur. 2006, 1, 440–456. [Google Scholar] [CrossRef] [Green Version]
- Rial, A.; Deng, M.; Bianchi, T.; Piva, A.; Preneel, B. A Provably Secure Anonymous Buyer–Seller Watermarking Protocol. IEEE Trans. Inf. Forensics Secur. 2010, 5, 920–931. [Google Scholar] [CrossRef] [Green Version]
- Rial, A.; Balasch, J.; Preneel, B. A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 2011, 6, 202–212. [Google Scholar] [CrossRef] [Green Version]
- Xu, Z.; Li, L.; Gao, H. Bandwidth Efficient Buyer-seller Watermarking Protocol. Int. J. Inf. Comput. Secur. 2012, 5, 1–10. [Google Scholar] [CrossRef]
- Bianchi, T.; Piva, A. TTP-free asymmetric fingerprinting based on client side embedding. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1557–1568. [Google Scholar] [CrossRef] [Green Version]
- Bianchi, T.; Piva, A.; Shullani, D. Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding. Eurasip J. Inf. Secur. 2015, 2015. [Google Scholar] [CrossRef] [Green Version]
- Frattolillo, F. A Buyer–Friendly and Mediated Watermarking Protocol for Web Context. ACM Trans. Web. 2016, 10, 1–8. [Google Scholar] [CrossRef]
- Frattolillo, F. Watermarking protocols: An excursus to motivate a new approach. Int. J. Inf. Secur. 2018, 17, 587–601. [Google Scholar] [CrossRef]
- Frattolillo, F. A multiparty watermarking protocol for cloud environments. J. Inf. Secur. Appl. 2019, 47, 246–257. [Google Scholar] [CrossRef]
- Tapscott, D.; Tapscott, A. Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World; Portfolio-Penguin: New York, NY, USA, 2016. [Google Scholar]
- Mougayar, W. The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology; Wiley: Hoboken, NJ, USA, 2016. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Aggarwal, S.; Chaudhary, R.; Aujla, G.S.; Kumar, N.; Choo, K.K.R.; Zomaya, A.Y. Blockchain for smart communities: Applications, challenges and opportunities. J. Netw. Comput. Appl. 2019, 144, 13–48. [Google Scholar] [CrossRef]
- Tresise, A.; Goldenfein, J.; Hunter, D. What Blockchain Can and Can’t Do for Copyright. Aust. Intellect. Prop. J. 2018, 28, 144–157. [Google Scholar]
- Macrinici, D.; Cartofeanu, C.; Gao, S. Smart contract applications within blockchain technology: A systematic mapping study. Telemat. Inform. 2018, 35, 2337–2354. [Google Scholar] [CrossRef]
- Ku, W.; Chi, C.H. Survey on the Technological Aspects of Digital Rights Management. In Proceedings of the 7th Int. Information Security Conference, Lecture Notes in Computer Science, Palo Alto, CA, USA, 27–29 September 2004; Zhang, K., Zheng, Y., Eds.; Springer: Berlin, Germany, 2004; Volume 3225, pp. 391–403. [Google Scholar]
- Zhang, Z.; Pei, Q.; Ma, J.; Yang, L. Security and Trust in Digital Rights Management: A Survey. Int. J. Netw. Secur. 2009, 9, 247–263. [Google Scholar]
- Abdalla, H.; Hu, X.; Wahaballa, A.; Abdalla, A.; Ramadan, M.; Zhiguang, Q. Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. Int. J. Netw. Secur. 2017, 19, 27–38. [Google Scholar]
- Barbareschi, M.; Cilardo, A.; Mazzeo, A. A partial FPGA bitstream encryption enabling hardware DRM in mobile environment. In Proceedings of the ACM Int. Conf. on Computing Frontiers, Como, Italy, 16–18 May 2016; ACM: New York, NY, USA, 2016; pp. 443–448. [Google Scholar]
- Lee, C.C.; Li, C.T.; Chen, Z.W.; Lai, Y.M.; Shieh, J.C. An improved E-DRM scheme for mobile environments. J. Inf. Secur. Appl. 2018, 39, 19–30. [Google Scholar] [CrossRef]
- Bhowmik, D.; Feng, T. The multimedia blockchain: A distributed and tamper-proof media transaction framework. In Proceedings of the 22nd Int. Conf. on Digital Signal Processing, London, UK, 23–25 August 2017; IEEE Computer Society: Washington, DC, USA, 2017; pp. 1–5. [Google Scholar]
- Meng, Z.; Morizumi, T.; Miyata, S.; Kinoshita, H. Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain. In Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference, Tokyo, Japan, 23–27 July 2018; IEEE Computer Society: Washington, DC, USA, 2018; pp. 359–364. [Google Scholar]
- Zhaofeng, M.; Weihua, H.; Hongmin, G. A new blockchain-based trusted DRM scheme for built-in content protection. Eurasip J. Image Video Process. 2018, 2018, 91. [Google Scholar] [CrossRef]
- Deng, M.; Preneel, B. Attacks On Two Buyer-Seller Watermarking Protocols and An Improvement for Revocable Anonymity. In Proceedings of the IEEE Int. Symp. on Electronic Commerce and Security, Guangzhou, China, 3–5 August 2008; IEEE Computer Society: Washington, DC, USA, 2008; pp. 923–929. [Google Scholar]
- Deng, M.; Preneel, B. On secure and anonymous buyer-seller watermarking protocol. In Proceedings of the 3rd Int. Conf. on Internet and Web Applications and Services, Athens, Greece, 8–13 June 2008; IEEE Computer Society: Washington, DC, USA, 2008; pp. 524–529. [Google Scholar]
- Deng, M.; Bianchi, T.; Piva, A.; Preneel, B. An efficient buyer-seller watermarking protocol based on composite signal representation. In Proceedings of the 11th ACM Workshop on Multimedia and Security, Princeton, NJ, USA, 7–8 September 2009; ACM: New York, NY, USA, 2009; pp. 9–18. [Google Scholar]
- Wen, Q.; Wang, Y. Improvement of the Digital Watermarking Protocol based on the Zero-Watermark Method. In Proceedings of the 3rd Annual Summit and Conf. of Asia Pacific Signal and Information Processing Association, Xi’an, China, 18–21 October 2011; APSIPA Publisher: Xi’an, China, 2011. [Google Scholar]
- Terelius, B. Towards transferable watermarks in buyer-seller watermarking protocols. In Proceedings of the IEEE Int. Work. on Information Forensics and Security, Guangzhou, China, 18–21 November 2013; IEEE Computer Society: Washington, DC, USA, 2013; pp. 197–202. [Google Scholar]
- Qiao, L.; Nahrstedt, K. Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J. Vis. Commun. Image Represent. 1998, 9, 194–210. [Google Scholar] [CrossRef] [Green Version]
- Poh, G.S.; Martin, K.M. Classification Framework for Fair Content Tracing Protocols. In Proceedings of the 8th Int. Workshop on Digital Watermarking, Guildford, UK, 24–26 August 2009; Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M., Eds.; Lecture Notes in Computer Science. Springer: Berlin, Germany, 2009; Volume 5703, pp. 252–267. [Google Scholar]
- Poh, G.S. Design and Analysis of Fair Content Tracing Protocols. Ph.D. Thesis, Department of Mathematics Royal Holloway, University of London, Egham, Surrey, UK, 2009. [Google Scholar]
- Cong, L.W.; He, Z. Blockchain Disruption and Smart Contracts. Rev. Financ. Stud. 2019, 32, 1754–1797. [Google Scholar] [CrossRef]
- Fontaine, C.; Galand, F. A Survey of Homomorphic Encryption for Nonspecialists. Eurasip J. Inf. Secur. 2007, 2007. [Google Scholar] [CrossRef] [Green Version]
- Bianchi, T.; Piva, A. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues. IEEE Signal Process. Mag. 2013, 30, 87–96. [Google Scholar] [CrossRef]
- Ellison, C.; Frantz, B.; Lampson, B.; Rivest, R.; Thomas, B.; Ylonen, T. SPKI Certificate Theory; RFC 2693; RFC Editor: Marina del Rey, CA, USA, 1999. [Google Scholar]
- Williams, D.M.; Treharne, H.; Ho, A.T.S. On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. In Proceedings of the Int. Conf. on Security and Cryptography, Athens, Greece, 26–28 July 2010; IEEE Computer Society: Washington, DC, USA, 2010; pp. 441–446. [Google Scholar]
- Rannenberg, K. Multilateral Security. In A Concept and Examples for Balanced Security. In Proceedings of the 9th ACM Workshop on New Security Paradigms, Ballycotton, County Cork, Ireland, 18–21 February 2001; ACM: New York, NY, USA, 2001; pp. 151–162. [Google Scholar]
- Rannenberg, K.; Royer, D.; Deuker, A. The Future of Identity in the Information Society—Challenges and Opportunities; Springer: Berlin, Germany, 2009. [Google Scholar]
- Canetti, R. Security and Composition of Cryptographic Protocols: A Tutorial. ACM SIGACT News. 2006, 37, 67–92. [Google Scholar] [CrossRef]
- Hartung, F.; Su, J.K.; Girod, B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks. In Proceedings of the SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 23–27 January 1999; Delp, E.J., Wong, P.W., Eds.; SPIE: Bellingham, WA, USA, 1999; Volume 3657, pp. 147–158. [Google Scholar]
- Katzenbeisser, S.; Veith, H. Securing Symmetric Watermarking Schemes Against Protocol Attacks. In Proceedings of the SPIE Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, 19 January 2002; Delp, E.J., Wong, P.W., Eds.; SPIE: Bellingham, WA, USA, 2002; Volume 4675, pp. 260–268. [Google Scholar]
- Petitcolas, F.A.P. Watermarking schemes evaluation. IEEE Signal Process. Mag. 2000, 17, 58–64. [Google Scholar] [CrossRef]
- Petitcolas, F.A.P.; Steinebach, M.; Raynal, F.; Dittmann, J.; Fontaine, C.; Fates, N. A public automated web-based evaluation service for watermarking schemes: StirMark Benchmark. In Proceedings of the SPIE Electronic Imaging 2001, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 22–25 January 2001; Wong, P.W., Delp, E.J., Eds.; SPIE: Bellingham, WA, USA, 2001; Volume 4314, pp. 575–584. [Google Scholar]
- Barni, M.; Bartolini, F. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications; CRC Press: Boca Raton, FL, USA, 2004. [Google Scholar]
- Chen, B.; Wornell, G. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 2001, 47, 1423–1443. [Google Scholar] [CrossRef] [Green Version]
- Malvar, H.S.; Florêncio, D.A.F. Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking. IEEE Trans. Signal Process. 2003, 51, 898–905. [Google Scholar] [CrossRef] [Green Version]
- Prins, J.P.; Erkin, Z.; Lagendijk, R.L. Anonymous fingerprinting with robust QIM watermarking techniques. Eurasip J. Inf. Secur. 2007, 2007. [Google Scholar] [CrossRef] [Green Version]
- Zebbiche, K.; Khelifi, F.; Loukhaoukha, K. Robust additive watermarking in the DTCWT domain based on perceptual masking. Multimed. Tools Appl. 2018, 77, 21281–21304. [Google Scholar] [CrossRef] [Green Version]
- Begum, M.; Uddin, M.S. Analysis of Digital Image Watermarking Techniques through Hybrid Methods. Adv. Multimed. 2020, 2020. [Google Scholar] [CrossRef]
- Bellare, M.; Rogaway, P. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In Proceedings of the 25th Int. Cryptology Conference, Saint Petersburg, Russia, 28 May–1 June 2006; Vaudenay, S., Ed.; Lecture Notes in Computer Science. Springer: Berlin, Germany, 2006; Volume 4004, pp. 409–426. [Google Scholar]
- Williams, D.M.; Treharne, H.; Ho, A.T.S.; Waller, A. Formal Analysis of Two Buyer-Seller Watermarking Protocols. In Proceedings of the 7th Int. Workshop on Digital Watermarking, Lecture Notes in Computer Science, Busan, Korea, 10–12 November 2008; Kim, H.J., Katzenbeisser, S., Ho, A.T.S., Eds.; Springer: Berlin, Germany, 2008; Volume 5450, pp. 278–292. [Google Scholar]
- Canetti, R. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In Proceedings of the 42nd IEEE Int. Symp. on Foundations of Computer Science, Newport Beach, CA, USA, 8–11 October 2001; IEEE Computer Society: Washington, DC, USA, 2001; pp. 136–145. [Google Scholar]
- Paillier, P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of the Eurocrypt ‘99, Lecture Notes in Computer Science, Prague, Czech Republic, 2–6 May 1999; Springer: Berlin, Germany, 1999; Volume 1592, pp. 223–238. [Google Scholar]
- Ethereum. Available online: https://ethereum.org (accessed on 1 November 2020).
- Solidity. Available online: https://solidity.readthedocs.io (accessed on 1 November 2020).
- Bamakan, S.M.H.; Motavali, A.; Bondarti, A.B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 2020, 154, 113385. [Google Scholar] [CrossRef]
- Fernandez-Carames, T.M.; Fraga-Lamas, P. A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories. IEEE Access 2019, 7, 45201–45218. [Google Scholar] [CrossRef]
- Palacios, R.C.; Gordon, M.S.; Aranda, D.A. A critical review on blockchain assessment initiatives: A technology evolution viewpoint. J. Softw. Evol. Process. 2020, 2020. [Google Scholar] [CrossRef]
Symbol | Meaning |
---|---|
buyer | |
content provider or seller | |
registration authority | |
blockchain | |
judge | |
X | digital content purchased by |
information used by to unambiguously identify X | |
timestamp referred to the transaction by which buys X | |
information used to identify | |
destination address provides by | |
N | nonce used to mark the watermarking transaction |
W | watermark |
part of the watermark W generated by the entity | |
watermarked X | |
public key of the entity | |
secret key of the entity | |
one time public key generated by the entity in the transaction to watermark X | |
one time secret key generated by the entity in the transaction to watermark X | |
token encrypted using the key and a public key cryptosystem | |
token digitally signed using the secret key and the SHA-1 secure hash algorithm | |
token encrypted using the key and a cryptosystem that is privacy homomorphic with respect to the watermark insertion | |
decryption function corresponding to the encryption function |
: | visits the ’s web site and chooses the content X | |
: | request for | |
: | {request for security tokens} | |
: | ||
: | ||
: | generates | |
: | generates | |
: | generates | |
: | ||
: | ||
: | ||
: | activates the smart contract | |
: | compares the tokens and verifies the signatures included in and | |
: | generates a node in the blockchain by which to publish , , | |
, , , | ||
: | implements the payment phase | |
: | ||
: | ||
: | ||
: | saves a new entry in its databases composed of , , , , | |
, and | ||
whose search key is | ||
: | ||
: |
: | finds in the market and extracts | |
---|---|---|
: | searches its databases for a possible match on | |
: | ||
: | searches for a node including and | |
: | retrieves the tokens published in the node of , which are , , , | |
, , | ||
: | verifies if the tokens retrieved from match those ones received from | |
: | ||
: | decrypts | |
: | ||
: | compares with N and adjudicates |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Frattolillo, F. A Watermarking Protocol Based on Blockchain. Appl. Sci. 2020, 10, 7746. https://doi.org/10.3390/app10217746
Frattolillo F. A Watermarking Protocol Based on Blockchain. Applied Sciences. 2020; 10(21):7746. https://doi.org/10.3390/app10217746
Chicago/Turabian StyleFrattolillo, Franco. 2020. "A Watermarking Protocol Based on Blockchain" Applied Sciences 10, no. 21: 7746. https://doi.org/10.3390/app10217746
APA StyleFrattolillo, F. (2020). A Watermarking Protocol Based on Blockchain. Applied Sciences, 10(21), 7746. https://doi.org/10.3390/app10217746