A novel blockchain-watermarking mechanism utilizing interplanetary file system and fast walsh hadamard transform


Journal article


Tong Liu, Si-Nga Lai, Xiaochen Yuan, Yue Liu, Chan-Tong Lam
iScience, vol. 27, Elsevier, 2024


Link
Cite

Cite

APA   Click to copy
Liu, T., Lai, S.-N., Yuan, X., Liu, Y., & Lam, C.-T. (2024). A novel blockchain-watermarking mechanism utilizing interplanetary file system and fast walsh hadamard transform. IScience, 27. https://doi.org/10.1016/j.isci.2024.110821


Chicago/Turabian   Click to copy
Liu, Tong, Si-Nga Lai, Xiaochen Yuan, Yue Liu, and Chan-Tong Lam. “A Novel Blockchain-Watermarking Mechanism Utilizing Interplanetary File System and Fast Walsh Hadamard Transform.” iScience 27 (2024).


MLA   Click to copy
Liu, Tong, et al. “A Novel Blockchain-Watermarking Mechanism Utilizing Interplanetary File System and Fast Walsh Hadamard Transform.” IScience, vol. 27, Elsevier, 2024, doi:10.1016/j.isci.2024.110821.


BibTeX   Click to copy

@article{liu2024a,
  title = {A novel blockchain-watermarking mechanism utilizing interplanetary file system and fast walsh hadamard transform},
  year = {2024},
  journal = {iScience},
  publisher = {Elsevier},
  volume = {27},
  doi = {10.1016/j.isci.2024.110821},
  author = {Liu, Tong and Lai, Si-Nga and Yuan, Xiaochen and Liu, Yue and Lam, Chan-Tong}
}

Abstract: This article proposes a new digital watermarking mechanism based on the Ethereum blockchain, Smart Contract, and Interplanetary File System (IPFS), with an enhanced Fast Walsh Hadamard Transform (FWHT) algorithm for watermark embedding and extraction. The proposed scheme aims to address the limitations of existing digital watermarking techniques, such as dependence on third-party platforms, by leveraging the decentralization feature of blockchain. The Smart Contract is used to manage the transaction between the parties involved in the watermarking process, while IPFS is used to store the watermark data. The enhanced FWHT algorithm is used to embed the watermark into the host image without affecting its visual quality. The results show that the proposed scheme outperforms the state-of-the-art algorithms in terms of both imperceptibility and robustness. Additionally, it demonstrates that our scheme can effectively resist various attacks. Therefore, our scheme can be a promising solution for image copyright protection, authentication applications, and image trading.


Tools
Translate to