Introduction
With the development of the internet, digital information technology is replacing books, newspapers, and offline exhibitions by playing the role of the main media in providing information in our daily life. However, there have some core issues in digital copyright systems:
Traditional copyright protection methods cannot work in the field of digital publishing protection. Coupled with the general wrong consumption concept and the lack of awareness of copyright protection, digital products have become the “disaster area” of copyright protection (LIZ, 2020). Since 2018, the rise of knowledge payment has led more enterprises and individuals to participate actively in the creation and sharing of digital works (HTML5, application, soft text, games, print media, academic articles, etc.). However, with the rapid development of word recognition technology and pirated aggregation websites, the malpractice of serious personal information leakage, rampant piracy works, continuous copyright disputes, and the infringement of original works have emerged, which has greatly damaged the information security and vital interests of the original subject. The state has introduced some Digital Rights Management (DRM) technologies to protect the original works. Although they have a certain protective effect, still they are cracked and even turned into monopoly tools, which not only affects the creative work of the creators but also has a trend of piracy. The current situation of piracy infringement has become a serious concern in the field of digital works and the disputes caused by digital copyright problems cannot be underestimated.
At present, there are some problems in the digital industry, such as imperfect authorization mechanism, difficult copyright certification, long license issuing time, and high registration cost, which are not suitable for the current pursuit of low-cost network creation. The main problems are summarized in Table S1.
From the above description, it can be observed that there is an urgent need for advanced mechanisms to solve various problems existing in the registration, confirmation, and transfer of digital rights during the process of digital rights protection. One possible solution is the use of blockchain technology. The Blockchain technology originated in 2008 and was once used as the public transaction ledger of cryptocurrency which name is bitcoin. Researchers said that blockchain has the potential to be widely used in copyright protection and management. The digital copyright data is contained in the block. Each block is linked to the blockchain in the form of a timestamp through the hash pointer pointing to the hash value of the previous block. In this way, it guarantees that digital copyright information cannot be manipulated. Blockchain can significantly reduce the cost of digital copyright protection, improve efficiency, and provide new ways to collect evidence, trade digital assets, and protect the rights of copyright owners. This technology has greater transparency and centrality than the traditional publishing technology, and cannot be changed at will. Therefore, great changes have taken place in all aspects of copyright protection technology (Crosby et al., 2016). According to the distribution of blocks, blockchain technology can be divided into the public blockchain, alliance blockchain, and private blockchain. It has the characteristics of decentralization, openness, independence, security, and anonymity. It is widely used in the Internet of Things (IoT) and logistics, public service, digital copyright, insurance, and public welfare.
This paper proposes a digital copyright protection system based on the Hyperledger Fabric blockchain network. Through this system, users can perform digital copyright registration, transaction, inquiry, and cancellation operations without third-party interference, which effectively protects the security of copyright and maintains the stability of the transaction.
The rest of this paper is divided into the sections:
First, the paper provides an analysis of the existing problems of copyright protection. Secondly, the paper introduces the background of digital copyright protection including digital watermarking technology, blockchain technology, and Hyperledger fabric. After that, the paper discusses some related work in the area. Third, the proposed scheme section discusses the proposed technical framework for copyright protection based on blockchain technology, including the system architecture, data structure design, and system implementation. The paper also presents an experimental and evaluation section. Finally, the paper summarizes this research and points out the future research directions.
Background Digital watermarking technology
Digital watermarking technology can be used in digital copyright protection (Sheppard, Safavi-Naini & Ogunbona, 2002; Deepa Merin Jose, Karuppathal & Vincent Antony Kumar, 2012; Woo, 2007). Digital watermarking technology is used to embed different iconic information as fingerprint information into digital media, and then distribute it to users. Digital fingerprint information can contain information such as the creator of digital media, the date of generation, and so on. Digital watermarking technology is generally having the characteristics of invisibility and robustness. The purpose of using watermarking technology is to prevent the copy and secondary distribution of illegal users by tracing them.
Although digital watermarking technology can solve many important problems in digital copyright protection, it still possesses some major problems:
Blockchain technology
One of the most auspicious technologies in the new economy is distributed ledger technology, also known as “blockchain”. The World Economic Forum has estimated that more than 25 countries have invested in blockchain technology, applied for more than 2,500 patents, and invested 1.3 billion US dollars (Blockchain, 2020). Klaus Schwab, Founder and Executive Chairman of the World Economic Forum, gives the following definition of this technology: “The blockchain is a shared, programmable, cryptographically secure and therefore trusted ledger which no single user controls and which can be inspected by anyone (Shapiro & Varian, 1999).”
In addition to digital currency, blockchain technology has begun to expand in other areas in recent years, including digital copyright protection (Savelyev, 2017; Fujimura et al., 2015; Xu et al., 2017). Blockchain is a distributed account book with multi-node participation where the data cannot tamper. The scheme allows the node to link and record the transaction data through the Merkle tree for some time. Each block contains not only the transaction data, but also the timestamp identification and the parent block hash Blockchain. Blockchain development goes through the following three stages:
From the point of view of storage architecture, blockchain technology is a chain structure in which each block is connected in the order of timestamp, which involves techniques such as Hash function, Merkle tree, timestamp, and point to point (P2P) network (Wang et al., 2018; Di & Zhusong, 2018; Yang et al., 2018; Lee et al., 2008), etc.
As shown in Fig. 1, the block structure can be divided into two parts: block header and block body. The block header contains the block version number representing the current block version, the hash value of the previous block header, the hash value of the Merkle tree root node generated from the transaction list, the timestamp generated by the block that can be accurate to seconds, the difficulty target representing the mining difficulty value, and the random value used in the mining process. The block body contains the number of transactions in the current block and hash values specific to each transaction, which are connected through a data structure called a Merkle tree.
The hash function also called a hash algorithm, is a method for creating small digital “fingerprints” for any kind of data. A hash function compresses a message or data into a summary that makes the amount of data smaller. This function creates a new hash value called (hash values, hash codes, hash sums, or hashes) fingerprints for the data. Mostly a hash value is a string of short random letters and numbers. Two hash codes rarely have hash conflicts in the input domain. It is very hard to temper or sniff the hash codes for particular data. Furthermore, if two hash values are different than the original input of the two hash values is also different. On the other hand, the input and output of a hash function are not uniquely related. Message-digest algorithm (MD5) (De Guzman, Sison & Medina, 2018), Secure Hash Algorithm 1 (SHA-1) (Ren et al., 2019) and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) (Giechaskiel, Cremers & Rasmussen, 2018), are some common hash functions. The specific hash function used in the blockchain field is the Secure Hash Algorithm 256 (SHA256) function. A blockchain calculates a specific hash value by a hash function, and each block has a hash value of the previous block so that a chain-like data structure is formed between the blocks. The hash function has an important feature that when a hash value is generated for input and the input is modified even if it is only a very small part of it, the new hash value for the same input is completely changed.
According to whether the nodes of the blockchain need to be authenticated to participate in the recording of the block, the blockchain can be generally divided into three types, namely public chain, private chain, and alliance chain. The node of the public chain can be added to the blockchain system without any certification, and the private chain is only open to very limited internal individuals or entities. The nodes of the alliance chain are only open to members and limited third-party members of a particular group. Hyperledger Fabric is a very important alliance chain technology, and the paper use Hyperledger Fabric technology to implement copyright protection systems. The paper will introduce Hyperledger Fabric technology in the next section.
Hyperledger fabric
In December 2015, the Linux Foundation announced the launch of the Hyperledger project, which aims to build an open platform to enable project members to work together, simplify business processes and promote the cross-industry application of blockchains. Unlike Bitcoin and Ethernet Square, which do not have any licensed public chains, the Hyperledger project only allows licensed members to join to have a certain trust base. Therefore, Hyperledger is not completely decentralized but can be considered as an alliance chain.
The fabric uses a modular architectural design. Its core features include the following six aspects:
The system architecture of Hyperledger Fabric (Klaokliang et al., 2018) is shown in Fig. 2, which can be divided into four layers from bottom to top:
Several basic concepts involved in the Hyperledger Fabric are described below:
Related work
Many scholars have studied the use of blockchain technology to protect digital copyright (Wamba, Queiroz & Trinchera, 2020; Zou, Lv & Wang, 2019; Zhao & O’Mahony, 2018; Meng et al., 2018; Bellini, Iraqi & Damiani, 2020; Xiao et al., 2020; Zhao et al., 2020; Zhaofeng, Weihua & Hongmin, 2018; Peng et al., 2019a; Peng et al., 2019b; Liang et al., 2020; Chen, Zhang & Wei, 2020; Shi, Yi & Kuang, 2019; Miao et al., 2018; Ambili, Sindhu & Sethumadhavan, 2017; Ding et al., 2019; Tsai et al., 2017; Gürkaynak et al., 2018; Schönhals, Hepp & Gipp, 2018).
According to Wamba, Queiroz & Trinchera (2020), the use of blockchain technology can effectively reduce the market friction in the digital copyright trading market and improves the efficiency of licensing and the creative enthusiasm of creators. The intelligent contract in the blockchain has proved to be an effective way to confirm the right of copyright license and provide a higher level of transparency of capital flow for creators.
To address the problem of photo fraud, photo tracking, and copyright dispute, a photo forensics scheme based on blockchain is proposed by Zou, Lv & Wang (2019).
Zhao & O’Mahony (2018) have proposed an Ethernet-based application that protects music copyright and ensures copyright holders’ income rights.
A design scheme of copyright management system based on digital watermarking and its information is proposed by Meng et al. (2018). It combines digital watermarking, blockchain, perceptual hash function, fast response code, and InterPlanetary File System (IPFS).
Bellini, Iraqi & Damiani (2020) provides a comprehensive survey of the use of blockchains in distributed trust and reputation management systems (DTRMS) environments, including distributed picture sharing, picture copyright protection, and so on.
Xiao et al. (2020) provides the mathematical model of quadratic matrix transformation of an intellectual property transaction. A blockchain-based intellectual property protection algorithm is proposed.
A copyright trading protection method based on blockchain technology is proposed by Zhao et al. (2020). This method protects the complete copyright transaction process and identifies the attribute identification of the image content.
Zhaofeng, Weihua & Hongmin (2018) proposed a watermark and blockchain-based art image copyright management scheme, which uses image Arnold transformation to enhance security, image Discrete Cosine Transformation (DCT) if coefficient embedded watermark, enhance robustness.
Peng et al. (2019a) proposes a secure digital copyright management system based on Ethernet. A public chain-based system enables copyright owners and users to trade directly without resorting to central organizations.
A new method of cross-platform digital resource right recognition and infringement tracking based on intelligent contracts is designed by Peng et al. (2019b). At the same time, the intelligent contract is used to realize the right transaction.
Liang et al. (2020) proposed a knowledge copyright protection blockchain based on homomorphic encryption, which effectively solves the problems of low security of private data, low storage efficiency of transaction data, and low efficiency of cooperative supervision in the current knowledge copyright trading protection.
Chen, Zhang & Wei (2020) designed a decentralized video copyright protection protocol. The agreement provides copyright protection for videos on the blockchain, users can submit videos that may infringe copyright as a proposal, and the copyright committee can vote on the proposal to reach an agreement.
By using blockchain technology and Scale-invariant feature transform (SIFT) local feature extraction algorithm, Shi, Yi & Kuang (2019) implemented a new generation of image digital copyright systems. SIFT algorithm is used to extract the invariant features from images such as angles, brightness, and rotation, etc., and using IPFS for distributed storage of images’ copyright features. Finally, Hyperledger Fabric and smart contract are used to realize copyright registration, copyright transfer, and other functions. The author says it has the advantages of automatic similar infringement detection, decentralized storage, tamper-proof, and traceability.
New digital copyright works management system for protection, trading, and distribution based on Data Ownership Security Architecture (DOSA)was proposed by Miao et al. (2018) which can overcome the deficiencies of existing systems. DOSA is an architecture for data protection and application by using digital certification authentication and public key infrastructure.
DotBlockchain (Ambili, Sindhu & Sethumadhavan, 2017) was established by the Pledge Music Company, a start-up company in New York. The platform creates a new music format, called the .bc or dotBC. On the DotBlockchain platform, when an artist or rights holder publishes their musical work, they will create a .bc file instead of a standard audio file. Music data is bundled into a .bc file, including information on songwriters, performers, and the title of the music. Once this step is completed, all information is written into the blockchain and available to the public. Specialized players will use .bc rules to decode metadata and authorize or reject the play request.
Ding et al. (2019) combine digital copyright registration technology and blockchain technology to design a complete copyright registration protection application system. It focuses on the data storage protection of copyright and the security and reliability of blockchain technology. At the software level, the data is reliable and has a wide range of application prospects in the future.
Tsai et al. (2017) proposed a blockchain-based model and framework for microfilms’ intellectual property (IP) protection in China, especially for microfilms’ scripts and names. Both the name and the script can be used to identify other microfilms, and they can be stored in the blockchain and database. Lightweight binary watermarks are used in this model, to protect the microfilm script (such as story outlines, outlines, scenes described by scenes, etc.).
Gürkaynak et al. (2018) proposed a blockchain-based solution to facilitate the operation of the IP offices, strengthen the custom procedures to detect counterfeit products, and improve the efficiency of intellectual property management for right holders. They also put forward some suggestions to pave the way for the development of blockchain technology, increase the number of people using the technology, and successfully integrate it into various services and registration/transaction channels in IP management.
Schönhals, Hepp & Gipp (2018) proposes a blockchain-based approach that can protect developed ideas and early concepts in product design and development. To guarantee both proof-of-existence and proof-of-origin, the origin stamp decentralized trusted timestamp service generates a specific hash from each digital artifact stored and embedded in the Bitcoin blockchain. Once this unique fingerprint is embedded in the transaction in the basic blockchain network, it can be proven where the specific contribution comes from due to the characteristics of the blockchain architecture.
However, these studies are focusing on a single aspect, without using a smart contract to manage the whole life cycle of copyright automatically. However, these achievements are also beneficial to the protection of digital rights (Borrego et al., 2019; Sagar, Jhaveri & Borrego, 2020; Mahatpure, Motwani & Shukla, 2019; Chaturvedi & Shukla, 2020; Jiang et al., 2020).
Proposed scheme System architecture
As discussed earlier, the paper proposes the following system structure, as shown in Fig. 3.
The system includes the copyright owner, the copyright receiver, and the distributed deployment of smart contracts, which can achieve a variety of business functions.
The workflow of the whole system is shown in Fig. 4.
The detailed description of the whole process is as follows:
According to the specific requirements of digital copyright protection, this research has implemented the following five modules as shown in Fig. 5: user registration module, digital copyright registration module, information query module (including digital copyright query module, user query module, and digital copyright transaction history query module), digital copyright transfer module and user cancellation module.
User management
User management is mainly divided into the following two modules:
(1) User registration module
The user registration module requires the user to fill in his name and Identity document (ID). The ID attribute cannot be repeated for the registered user. The user can also selectively enter basic information such as the mobile phone number and the work unit. The flow chart of the user registration module is shown in Fig. 6.
(2) User logout module
If the users need to cancel the accounts, they only have to enter the ID of the required cancellation account to cancel it. After account cancellation, the digital copyright also gets canceled. The flow chart of user logout is shown in Fig. 7.
Copyright management
Copyright management is mainly divided into the following three modules:
(1) Information query module
Users can choose three query modes to inquire information: digital copyright information query, user query, and digital copyright transfer record query. If the user enters the copyright number for the information query, it can query the relevant information of the copyright and the current owner of the copyright. When the user enters the user ID for the information query, he can query the user’s relevant information and all the copyrights currently owned. When the user makes a copyright transfer history query, he can view all transfer records from registration to date. The flow chart of the query module is shown in Fig. 8.
Figure 8: Query flow chart. The diagram describes the process diagram related to the query, including finding the information related to the user, finding the information related to the copyright and finding the information related to the copyright transfer. DOI: 10.7717/peerj-cs.709/fig-8
(2) Copyright registration module
Users need to enter the digital copyright number (the copyright number cannot be the same value as the registered copyright), the copyright name, and the copyright type, and upload the corresponding digital file. Another program converts the uploaded digital media files, and the transferred hash values are stored on the blockchain with copyright information. The flow chart of the copyright registration module is shown in Fig. 9.
(3) Copyright transfer module
The user is required to enter the copyright number, ID of the copyright owner, and the copyright granter ID for the copyright to be transferred. During this step, the copyright transfer will also get updated at the same time. Furthermore, the transferred copyright is removed from the transferor side and is added to the copyright information owned by the grantor. The flow chart of the copyright transfer module is shown in Fig. 10.
Data structure design
For the storage system of digital copyright protection, the required parameters of each module are designed according to the traceability requirements of each module. The system involves three entities: user, digital copyright, and copyright change history. The relationship is shown in Fig. 11.
All entity-specific parameters in the system are designed as shown in Tables S2–S4.
The user can query the user’s information by entering the user ID, user’s basic information, and the copyright number of the copyright owned by the user, which is the interactive object of this system. In the copyright transfer operation, the user also needs to enter the original owner of the copyright and the user ID of the grantor.
Digital copyright is the core entity in this system and almost all the user’s operations involve this entity. The Metadata parameter of digital copyright is the hash value of digital media files uploaded by users after digital fingerprint extraction. This prevents the files uploaded by users from being tampered with.
When the user performs a copyright transfer operation, the corresponding copyright change records get generated with the copyright ID, and then all the transfer records of particular copyright can be viewed in the subsequent copyright transfer query.
Each ledger maintained by peer nodes in the Blockchain system consists of two parts: World state and Blockchain. The world state stores the latest values of all the transaction states, and the Blockchain system stores the data in the form of blocks.
System implementation
The Hyperledger Fabric network uses a single-machine multi-node network configuration with the start-up type solo. The network configuration of the system is networked with a sorting service node and peer nodes under two organizations, where each organization includes two peer nodes. In this implementation of the system, the listening port number of the orderer sorting service is set to 7050.
In the Hyperledger Fabric, the smart contracts are called chain codes. The smart contract will be installed and instantiated on a peer node service by an authorized member. Then, some business personnel can use a client that can execute the Fabric-Software Development Kit (Fabric-SDK) to interact with the peer node service to obtain the smart contract call.
The following is the structure defined in the smart contract, and the specific parameters are as follows:
type Digitalright struct {
Name string `json: “name”`
Id string `json: “id”`
Type string `json: “type”`
Metadata string `json: “metadata”`
}
type DigitalrightHistory struct {
DigitalrightId string `json: “digitalright_id”`
OriginOwnerId string `json: “origin_owner_id”`
CurrentOwnerId string `json: “current_owner_id”`
}
type User struct {
Name string `json: “name”`
Id string `json: “id”`
Tel string `json: “tel”`
Gender string `json: “gender”`
Address string `json: “address”`
Password string `json: “password”`
Digitalrights []string `json: “digitalrights”`
}
In this work, chain-code is used to implement complex business logic. In the proposed methodology, the Go programming language is used to develop the chain code. All functional interfaces that are included in the smart contract are shown in Table S4.
The Smart contracts will run on public channels and all the users can write their identity and copyright information into the blockchain to complete the copyright transactions. After the data is written into the blockchain network, it cannot tamper and it is added to the public channel. All peer nodes of the channel can also query all transaction information in the channel. The following steps briefly introduce the five main algorithms involved in the smart contract:
Experiments and evaluation
In this work, the authors have proposed to design and implement a digital copyright protection system based on the Hyperledger Fabric blockchain network. Through this system, users can perform digital copyright registration, transaction, inquiry, and cancellation operations without third-party interference, which effectively protects the security of copyright and maintains the stability of the transaction.
Experimental environment
This paper used the following testing environment in Tables S5 and S6:
The system was built using Hyperledger Fabric version 1.0. The paper used the “docker-compose -f docker-orderer.yaml up –d” and “docker-compose -f docker-peer.yaml up –d” to start the ordering service node and peer node. “docker ps” command was used to check whether the container is successfully started. The container query result is shown in Fig. S1, where the ordering service and peer node both started successfully.
After all the containers were started successfully, the next step was to create a channel (channel) and join the operation. Since there is no third-party SDK to make the join, the joining of the channel only needs to enter the started client (CLI) to operate. The channel was created using the command “Peer channel create -o orderer.example.com:7050 -c mychannel -t 50 –f ./channel-artifacts/mychannel.tx”. This command defines the channel ID to be created as mychannel. After the channel is created, the file is blocked after joining, and the start of the fabric network is completed.
Test case
When designing the test data, all functions of the system should be tested. At the same time, possible events should be taken into consideration so that the system can be fully tested, to judge whether the system meets the design requirements. Tables S7–S9 shows system construction data (the construction data is only for testing the functions implemented by the smart contract).
Test results
During the user registration function test, the “peer chaincode invoke -C mychannel -n mychannel -c‘{“Args”: [“userRegister”, “Piff”, “522003”]}”’ format commands are used for network interaction. When the user's input parameters meet the requirements, the system will prompt success, else the system will report the corresponding error. The test results are shown in Figs. S2–S4.
When testing the copyright registration function, use peer chain code invoke -C mychannel -n mychannel -c‘{“Args”: [“assetEnroll”, “Manta”, “20191101”, “213214123123”, “522001”]}’ format The command interacts with the system. Similarly, when the user inputs parameters that meet the requirements, the system will prompt success. When the user enters an existing copyright number, a non-existent user ID, or does not enter enough parameters, the system will report a corresponding error. The test results are shown in Figs. S5–S8.
During the test of copyright transfer functions, the command of peer chain code invokes -C mychannel -n mychannel –c‘{“Args”: [“assetExchange”, “user1”, “522001”, “522002”]}’ are used where the user Sean The “Blooming” owned is transferred to the user Lexie. After the operation is successful, the target copyright and the information of both users get updated. When the user enters a non-existent copyright number, a non-existent user ID or it does not enter enough parameters, the system will report the error. The test results are shown in Figs. S9–S12.
The query function involves three parts: user, copyright, and copyright transaction record query. The logic of the query function is similar, that’s why only the results of successful queries are displayed. As shown in Fig. S13, the query for the user with ID “522002” has returned the user’s basic information and all the copyright number information. Figure S14 shows the result of querying the copyright number “19980722”, which correctly returns the copyright name, ID, and hash value of it. Figure S15 shows the results of querying the copyright number for which the results are returned including all transaction records of “19980722” (including copyright registration).
Result analysis
We have presented a comparative analysis in which we have compared our proposed methods with already developed similar methods to prove the efficiency. Table S10 shows a comparison of the proposed model with other similar models. The comparative analysis is performed based on five aspects.
It can be seen from the above tables that, only the proposed scheme supports the whole life cycle management. Other schemes need a lot of calculation for using public blockchain (Zhao & O’Mahony, 2018) or using homomorphic encryption (Liang et al., 2020) or using watermarks technology (Ambili, Sindhu & Sethumadhavan, 2017). Only this scheme support protection of different types of files. The scheme is needed to pay the fee by using Ethereum (Zhao & O’Mahony, 2018). The other compared schemes do not support smart contracts (Liang et al., 2020; Ambili, Sindhu & Sethumadhavan, 2017; Tsai et al., 2017).
According to the previous comparative analysis, the system can realize the automatic management of the whole life cycle of digital rights on the blockchain by using fabric’s smart contract technology. The whole life cycle of digital rights includes the registration, transfer, and query of digital rights and so on.
Because the data on the blockchain has the function of distributed storage and tamper proof, all the data about the whole life cycle of digital rights are stored on the blockchain. In this way, the data stored in the system has authority and credibility, preventing the theft of digital rights, and realizing the effective protection of digital rights.
Conclusion and future work
With the rapid development of digital publishing, digital copyright infringement is becoming more and more serious. The frequent occurrence of infringement cases has severely dampened the enthusiasm of original creators. Due to the tamper-proof, decentralized, and other features of blockchain, this paper uses these features to build a copyright protection system.
Firstly, this paper analyses the problems existing in digital copyright protection. Secondly, this paper introduces digital watermarking technology, blockchain technology, and the work of other researchers. Thirdly, a digital rights protection system based on an alliance chain structure is proposed. The system uses smart contracts to automatically manage the entire life cycle of digital rights without any trusted third party. Then the prototype design and experiment of the system are carried out, and the experimental results are compared with other schemes from five different aspects. The five aspects include if support whole life cycle management copyright, need pay fee, support smart contract and so on. The comparison results show the superiority of the scheme, and finally, the conclusion is given.
In the future, this study will reshape the business process of digital rights protection, implement some important steps on mobile terminals, and comprehensively consider security and convenience, and also find the infringement of copyright by using big data technology is an interesting work in the future.
Supplemental Information
Related configuration files for building blockchain networks.
There are related certificates, configuration files, block chain network initialization, startup, end script files and so on.
DOI: 10.7717/peerj-cs.709/supp-1
Download
Chaincode source file.
Implementation code for copyright protection based on smart contracts
DOI: 10.7717/peerj-cs.709/supp-2
Download
Disadvantages of existing methods.
DOI: 10.7717/peerj-cs.709/supp-3
Download
User entity parameters.
DOI: 10.7717/peerj-cs.709/supp-4
Download
Digital rights entity parameters.
DOI: 10.7717/peerj-cs.709/supp-5
Download
Digital copyrights trade history entity parameters.
DOI: 10.7717/peerj-cs.709/supp-6
Download
Table of simulation hardware environment.
DOI: 10.7717/peerj-cs.709/supp-7
Download
Simulation software environment table.
DOI: 10.7717/peerj-cs.709/supp-8
Download
User test samples.
DOI: 10.7717/peerj-cs.709/supp-9
Download
Digital copyrights test samples.
DOI: 10.7717/peerj-cs.709/supp-10
Download
Digital copyrights transaction records test sample.
DOI: 10.7717/peerj-cs.709/supp-11
Download
Comparative analysis of safety attributes.
DOI: 10.7717/peerj-cs.709/supp-12
Download
Docker query result.
DOI: 10.7717/peerj-cs.709/supp-13
Download
User successfully registered.
DOI: 10.7717/peerj-cs.709/supp-14
Download
Enter duplicate ID.
DOI: 10.7717/peerj-cs.709/supp-15
Download
Not enough parameters entered.
DOI: 10.7717/peerj-cs.709/supp-16
Download
Successful registration of copyright.
DOI: 10.7717/peerj-cs.709/supp-17
Download
Enter the existing copyright number.
DOI: 10.7717/peerj-cs.709/supp-18
Download
Enter a user ID that does not exist.
DOI: 10.7717/peerj-cs.709/supp-19
Download
Not enough parameters entered.
DOI: 10.7717/peerj-cs.709/supp-20
Download
Copyright successfully transferred.
DOI: 10.7717/peerj-cs.709/supp-21
Download
The transferor does not own the target copyright.
DOI: 10.7717/peerj-cs.709/supp-22
Download
Participants did not register for the test.
DOI: 10.7717/peerj-cs.709/supp-23
Download
Not enough parameters entered.
DOI: 10.7717/peerj-cs.709/supp-24
Download
User query test.
DOI: 10.7717/peerj-cs.709/supp-25
Download
Copyright query test.
DOI: 10.7717/peerj-cs.709/supp-26
Download
Copyright transaction records query test.
DOI: 10.7717/peerj-cs.709/supp-27
Download
Additional Information and Declarations
Competing Interests
The authors declare that they have no competing interests.
Author Contributions
Yanhui Liu conceived and designed the experiments, performed the experiments, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.
Jianbiao Zhang conceived and designed the experiments, analyzed the data, authored or reviewed drafts of the paper, and approved the final draft.
Shupei Wu performed the experiments, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.
Muhammad Salman Pathan analyzed the data, authored or reviewed drafts of the paper, and approved the final draft.
Data Availability
The following information was supplied regarding data availability:
The raw measurements are available in the Supplementary Files.
Funding
This work was supported by the 2021 Beijing Natural Science Foundation (No. M21038). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Ambili KN, Sindhu M, Sethumadhavan M. 2017. On federated and proof of validation based consensus algorithms in blockchain. IOP Conference Series: Materials Science and Engineering 225(1):012198
Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, Caro AD, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukolic M, Cocco SW, Yellick J+11 more. 2018. Hyperledger fabric: a distributed operating system for permissioned blockchains.
Bellini E, Iraqi Y, Damiani E. 2020. Blockchain-based distributed trust and reputation management systems: a survey. IEEE Access 8:21127-21151
Blockchain. 2020. Blockchain: the operating system for the music. Revelator Whitepaper.
Borrego C, Amadeo M, Molinaro A, Jhaveri RH. 2019. Privacy-preserving forwarding using homomorphic encryption for information-centric wireless ad hoc networks. IEEE Communications Letters 23(10):1708-1711
Chaturvedi AK, Shukla PK. 2020. Effective watermarking technique using optimal discrete wavelet transform and sanitization technique. Multimedia Tools and Applications 79(19):13161-13177
Chen Q, Zhang S, Wei W. 2020. Decentralized autonomous video copyright protection.
Christidis K, Devetsikiotis M. 2016. Blockchains and smart contracts for the internet of things. IEEE Access 49(6):2292-2303
Crosby M, Nachiappan, Pattanayak P, Verma S, Kalyanaraman V. 2016. Blockchain technology: beyond bitcoin. Applied Innovation 2(6):71
De Guzman LB, Sison AM, Medina RP. 2018. MD5 secured cryptographic hash value.
Deepa Merin Jose, Karuppathal R, Vincent Antony Kumar A. 2012. Copyright Protection using Digital Watermarking.
Di S, Zhusong L. 2018. A new type of Merkle hash tree cloud data integrity audit scheme. Computer Engineering and Applications 2018(1):70-76
Ding Y, Yang L, Shi W, Duan X. 2019. The digital copyright management system based on blockchain.
Fujimura S, Watanabe H, Nakadaira A, Yamada T, Akutsu A, Kishigami J. 2015. BRIGHY: a concept for a decentralized rights management system based on blockchain.
Giechaskiel I, Cremers C, Rasmussen KB. 2018. When the crypto in cryptocurrencies breaks: bitcoin security under broken primitives. IEEE Security & Privacy 16(4):46-56
Gupta H, Hans S, Mehta S, Jayachandran P. 2018. On building efficient temporal indexes on hyperledger fabric.
Gürkaynak G, Yılmaz İ, Yeşilaltay B, Bengi B. 2018. Intellectual property law and practice in the blockchain realm. Computer Law & Security Review 34(4):847-862
Jiang T, Sui A, Lin W, Han P. 2020. Research on the application of blockchain in copyright protection.
Klaokliang N, Teawtim P, Aimtongkham P, Chakchai S, Niruntasukrat A. 2018. A novel IoT authorization architecture on hyperledger fabric with optimal consensus using genetic algorithm.
Lee U, Park JS, Lee SH, Ro WW, Pau G, Gerla M. 2008. Efficient peer-to-peer file sharing using network coding in MANET. Journal of Communications and Networks 10(4):422-429
Liang W, Zhang D, Lei X, Tang M, Zomaya A. 2020. Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Transactions on Emerging Topics in Computing 6750(c):1-11
Linux Foundation. 2019. Hyperledger fabric official document.
LIZ. 2020. The dilemma and outlet of my country’s digital copyright protection in the era of big data. Journal of Hainan Tropical Ocean University 27(03):91-94
Mahatpure J, Motwani M, Shukla PK. 2019. An electronic prescription system powered by speech recognition, natural language processing and blockchain technology. International Journal of Science & Technology Research (IJSTR) 08(08):1454-1462
Meng Z, Morizumi T, Miyata S, Kinoshita H. 2018. Design scheme of copyright management system based on digital watermarking and blockchain.
Miao F, Yang W, Fan W, Xie Y, Guo Q, You Y, Liu Z, Liu L. 2018. Digital copyright works management system based on DOSA.
Park WS, Hwang DY, Kim KH. 2018. A TOTP-based two factor authentication scheme for hyperledger fabric blockchain.
Peng W, Yi L, Fang L, Xinhua D, Ping C. 2019a. Secure and traceable copyright management system based on blockchain.
Peng Q, Zhenguan L, Xun W, Jianhai C, Bei W, Roger Z. 2019b. Digital resource rights confirmation and infringement tracking based on smart contracts.
Ren L, Fletcher CW, Kwon A, Dijk M, Devadas S. 2019. Design and implementation of the ascend secure processor. IEEE Transactions on Dependable and Secure Computing 16(2):204-215
Sagar R, Jhaveri R, Borrego C. 2020. Applications in security and evasions in machine learning: a survey. Electronics 9(1):97
Savelyev A. 2017. Copyright in the blockchain era: promises and challenges. National Research University Higher School of Economics (HSE), Basic Research Program Working Paper
Schönhals A, Hepp T, Gipp B. 2018. Design thinking using the blockchain: enable traceability of intellectual property in problem-solving processes for open innovation.
Shapiro C, Varian HR. 1999. Information rules: a strategic guide to the network economy. Boston, MA: Harvard Business School Press.
Sheppard NP, Safavi-Naini R, Ogunbona P. 2002. Digital watermarks for copyright protection. Journal of Law and Information Science 12(1):110-130
Shi J, Yi D, Kuang J. 2019. A blockchain and SIFT based system for image copyright protection.
Tsai WT, Feng L, Zhang H, You Y, Wang L, Zhong Y. 2017. Intellectual-property blockchain-based protection model for microfilms.
Wamba SF, Queiroz MM, Trinchera L. 2020. Dynamics between blockchain adoption determinants and supply chain performance: an empirical investigation. International Journal of Production Economics 229:107791
Wang J, Zhang T, Song J, Sebe N, Shen HT. 2018. A survey on learning to hash. IEEE Transactions on Pattern Analysis and Machine Intelligence 2016(99):1-790
Woo C-S. 2007. Digital image watermarking methods for copyright protection and authentication. Ph.D. Thesis, Queensland University of Technology
Xiao L, Huang W, Xie Y, Xiao W, Li KC. 2020. A blockchain-based traceable IP copyright protection algorithm. IEEE Access 2020(8):49532-49542
Xu R, Zhang L, Zhao H, Peng Y. 2017. Design of network media’s digital rights management scheme based on blockchain technology.
Yang D, Guo J, Wang ZJ, Wang Y, Zhang J, Hu L, Yin J, Cao J. 2018. FastPM: an approach to pattern matching via distributed stream processing. Information Sciences 453(1):263-280
Zhao C, Liu M, Yang Y, Zhao F, Chen S. 2020. Toward a blockchain based image network copyright transaction protection approach.
Zhao S, O’Mahony D. 2018. BMCprotector: A blockchain and smart contract based application for music copyright protection.
Zhaofeng M, Weihua H, Hongmin G. 2018. A new blockchain-based trusted DRM scheme for built-in content protection. EURASIP Journal on Image and Video Processing 2018(1):1-12
Zou R, Lv X, Wang B. 2019. Blockchain-based photo forensics with permissible transformations. Computers and Security 87(4):101567
Yanhui Liu1,2, Jianbiao Zhang1,2, Shupei Wu2, Muhammad Salman Pathan1,2
1 Beijing Key Laboratory of Trusted Computing, Beijing, China
2 Faculty of Information Technology, Beijing University of Technology, Beijing, China
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021 Liu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
With the recent development in network technology over a few years, digital works can be easily published online. One of the main issues in the field of digital technology is the infringement of digital works, which can seriously damage the data owners’ rights and affects the enthusiasm of the owners to create original work. Thus, more attention is required for the protection of digital copyright as it has a great impact on the development of society. Many digital copyright protection techniques were developed in the past, but still, there are many loopholes in the protection systems to be covered. The protection means are still relatively weak, timeliness is poor, infringement is frequent, a right determination is cumbersome, and the results are not ideal. Aiming at the mentioned problems, this paper proposes a protection technique, which can realize the automatic management of the complete digital rights life cycle on the blockchain using fabric's smart contract technology. The proposed system is based on blockchain technology, which leverages the distributed, tamper-proof and traceable characteristics of blockchain. The system uses smart contracts to manage the full life cycle of digital copyright. The test results show that the proposed system provides effective protection of the digital copyright system and can efficiently confirm the rights of digital copyright.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer