Copyright Management System to Protect the Legitimate Rights of Copy Right Owners.

  • Authors

    • K. Abitha
    • P. Rajasekar
    https://doi.org/10.14419/ijet.v7i4.6.28670
  • blockchain, copyright management, digital watermarking, perceptual hash function
  • In most up-to-date days there are augmented digital technology associated digital works wherever it comes to copyright management, protection and data modification guarantee have step by step become an imperative problem. The advance of computerized copyright protection system was supported digital watermarking chiefly targeted on the rule and digital media and we are going take a look at now is about the copyright management for computerized media files. That embrace computerized watermarking, the blockchain (BC), perceptual hash function (phash), Quick Response (QR) code, and Interplanetary File System (IPFS). Among them, Blockchain is employed to firmly saves watermark data and generates timestamp proof for multiple watermarks and multiple copyrights to verify when the node was created. This theme will boost the potency of computerized watermarking technology with legitimate rights and copyright protection. During this approach, gain a peer to peer network to interact and complete copyright management and distribution of proprietary function while not requiring a third party. Nodes have faith in cryptography to verify the identity of every node and make sure the security of data. This better the safety and transparency of data and quickens the distribution of copyrighted process to facilitate within the network. To preserve the authorized rights and engrossment of every legitimate user.

     

  • References

    1. [1] Ruzhi Xu, Lu Zhang Department of Internet “Design of Network Media’s Digital Rights Management Scheme Based on Blockchain Technology.†2017 IEEE 13th International.

      [2] Nicholas Paul Sheppard, Reihaneh Safavi-Naini and Philip Ogunbona, “Digital watermarks for copyright protection,†Journal of Law and Information Science, http://kirra.austlii.edu.au/au/journals/JlLawInfoSci/2001/9.html.

      [3] ADAM HEMLIN BILLSTRÖM and FABIAN HUSS

      [4] “Video Integrity through Blockchain Technology†170802-Adam_Hemlin_Billström_and_Fabian_Huss-with-cover.pdf.

      [5] BHOWMIK, Deepayan and FENG, Tian, “The multimedia blockchain: a distributed and tamper-proof media transaction framework†<http://orcid.org/0000-0003-1762-1578>

      [6] JPEG White paper: Towards a Standardized Framework for Media Blockchain SOURCE: WG1.

      [7] Ola Kjelsrud, “Perceptual Hash Algorithms to Identify Fragmented and Transformed Video Files.â€

      [8] Tallinn university of technology, “Possible application of perceptual image hashingâ€

      [9] Christoph Zauner “Implementation and Benchmarking of Perceptual Image Hash Functionsâ€

      [10] Evanthia Tsilichristou “A P2P Cultural Multimedia Network†– Maximizing Cultural Dissemination and Supporting Copyright Protection and Management

      [11] An embedded watermark technique in video for copyright protection You-Ru Lin*, Hui-Yu Huang**, and Wen-Hsing Hsu*.

      [12] Fu-HauHsu “Dual-watermarking by QR-code Applications in Image Processingâ€

      [13] Hamza ¨Ozer “Perceptual Audio Hashing Functionsâ€

      [14] Fatma Taher, Hussain Al-Ahmad Sohailah Alyammahi, “A New Multiple Watermarking Scheme for Copyright Protection and Image Authentication†2016

      [15] Visible Digital Image Watermarking by Compound Mapping Algorithm - EVA TUBA.

      [16] KINOSHITA Hirotsugu, “AN IMAGE DIGITAL SIGNATURE SYSTEM WITH ZKIP FOR THE GRAPH ISOMORPHISM,†IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP96, Vol. III, pages 247-250, September 1996.

      [17] IPFS - Content Addressed, Versioned, “ P2P File System (DRAFT 3)†Juan Benet juan@benet.ai.

      [18] Juan Benet, “IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) (online),†available: https://ipfs.io/ipfs/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k 7zrJa3LX/ipfs.draft3.pdf, 2014.

      [19] Faisal Alurki and Russell Mersereau, “A ROBUST DIGITAL WATERMARK PROCEDURE FOR STILL IMAGES USING DCT PHASE MODULATION,†10th European Signal Processing.

      [20] Computer Science and Telecommunications Board, National Research Council. The Digital Dilemma: Intellectual Property in the Information Age (pp. 2-3). Washington: National Academy Press.

      [21] Lancini, F. Mapelli, and S. Tubaro, “A robust video watermarking technique in the spatial domain,†in Proc. of the 8th IEEE Int. Symposium on Video/Image Processing and Multimedia Communications, pp. 251-256, June 16-19.

      [22] Y. A. Y. Al-Najjar and D. C. Soong, “Comparison of image quality assessment: PSNR, HVS, SSIM, UIQI,†International Journal of Scientific and Engineering Research, vol. 3, no. 8, pp. 1-5, 2012.

      [23] J. Rosenberg and A. Keranen “Interactive connectivity establishment (ice): A protocol for network address translator (NAT) traversal for offer/answer protocols†2013.

  • Downloads

  • How to Cite

    Abitha, K., & Rajasekar, P. (2018). Copyright Management System to Protect the Legitimate Rights of Copy Right Owners. International Journal of Engineering & Technology, 7(4.6), 477-480. https://doi.org/10.14419/ijet.v7i4.6.28670