Y-DWMS: A Digital Watermark Management System Based on Smart Contracts
Abstract
:1. Introduction
- An infringer obtains the copy of publication, refusing to pay copyright holders enough. Such scenarios include stealing a copy of publication, accessing it free via a third party, or purchasing it for less than the copyright holder’s price, etc.
- An agent refuses to pay enough to the copyright holders. Such scenarios include unauthorized agency and spreading, or concealment of all or partial sales volume by authorized agents, etc.
- Cracking keys. The infringer could try to steal or crack the decryption key for a copy by various means. But as cryptography improves, it is obviously costly.
- Screen recording. The infringer could directly obtain copies of audio, video, and images via screen recording or I/O monitoring. Defending such approaches technically seems expensive.
- Purchasing. The infringer could obtain a copy from the publisher by purchasing it. This approach is completely unstoppable, as the act itself is legal.
- How can we ensure that users do not actively share copies or keys? What is the methodology?
- How can we ensure that copyright holders will not bear any losses, even if users divulge copies through various means?
- How can we ensure the settlement of punishment and reward is immediate and non-repudiated?
1.1. Our Contribution
- In the common smart contract platform, the punishment of infringers could be compensated by informers if there are malicious smart contracts signed between infringers and informers. However, Y-DWMS could resist that, compared with common smart contract platforms like [20].
- We adopt game theory to prove that Y-DWMS can increase the cost of copyright infringement to infinity and resist countermeasures by signing smart contracts. Therefore, under the deterrence of Y-DWMS, the decision of non-infringement always dominates rational users.
1.2. Organization of the Paper
2. Background
2.1. Related Work
2.1.1. DRM Based on Various Encryption Techniques
2.1.2. DRM Based on Trusted Computing
2.1.3. DRM Based on Blockchain and Watermarking
2.2. Our Solutions
- In order to prevent users from sharing encryption keys or accounts, we use a public wallet key for users to control the copy encryption and account login, trying to bind key and account safety to the property safety of users, which amplifies the cost infinitely.
- In order to secure digital rights under the worst condition where an infringer has divulged the copy, a punishment and reward mechanism based on smart contracts is designed to verify watermarks in the divulged copy, authenticate the informer’s report, trace the infringer, perform punishment, reward informers, and recover losses the copyright holders suffered.
3. Our Scheme
3.1. Definitions
3.1.1. Symbols
3.1.2. YODA: Enabling Computationally Intensive Contracts
3.1.3. Pivotal Contracts
Algorithm 1 Contract_Publish |
|
Algorithm 2 Contract_Report |
|
3.2. System Modeling
Interaction
- Step ➀: The copyright holders release Contract_Publish and store publication to this contract.
- Step ➁: A user who decides to purchase stores deposits to this contract.
- Step ➂: Contract_Publish returns a copy of the publication embedded with copyright holder and user watermarks.
- Step ➃: When Contract_Publish is destroyed, copyright holders receive a deposit.
- Step ➄: Meanwhile, copyright holders release Contract_Report, which is aimed to the user, and ask the user to store a deposit to this contract.
- Step ➅: The user stores a deposit to this contract.
- Step ➆: The user divulges the copy by selling it to an informer.
- Step ➇: The informer pays for the divulged copy.
- Step ➈: The informer reports the infringement by submitting the copy and parameter X to Contract_Report.
- Step ➉: If a watermark is detected in the copy and verified by Contract_Report, the informer will get a deposit, the amount of which is X.
- Step ⑪: Meanwhile, copyright holders will get the deposit they deserve from publishing the publication.
- Step ⑫: If there is no infringement during a period that copyright holders consider appropriate, the deposit will be returned to the user.
4. Analysis Combining Game Theory
4.1. Copyright Offense by Colluding with Miners: Game Theoretical Dangerous
Non-infringement | Infringement |
0 |
4.2. Copyright Offense via Sharing Publication Copy: Game Theoretical Dangerous
- If C launches s, then the profit of C increases by v, and the profit of C increases by –v. v is the price for selling divulged copies.
- If C launches r, then the profit of C increases by b, the profit of C increases by –b–v, and the profit of the copyright holder increases by v. b is the reward for C, and v is original price of the publication.
- If C launches t, then the profit of C increases by –c, profit of C increases by c.
- If C launches v, then profit of C increases by –p.
4.3. Countering Punishment via Smart Contract: Impossible
Algorithm 3 Contract_Contermeasure |
|
4.4. Summary
5. Discussions
6. Conclusions
- Adopting smart contracts and digital watermarks could form a game between infringers and informers, as divulged copies are embedded with the signatures of infringers, and informers could get profit from infringers by submitting signed divulged copies to smart contracts. Losses copyright holders suffer could also be recovered by smart contract.
- Game analysis has proved that the game mentioned above could theoretically amplify the cost of infringement to infinity, under the condition that the deposit of the infringer is sufficient, as the distribution of the divulged copy is unstoppable among an infinite set of users under such a game environment.
- Game analysis has also proved that the punishment infringers deserve could not be recovered by signing smart contracts, as the logic of Contract_Report makes infringers never know how much deposit will finally lose.
Author Contributions
Funding
Conflicts of Interest
References
- Safavi-Naini, R.; Yung, M. Digital Rights Management: Technologies, Issues, Challenges and Systems; Springer: Berlin/Heidelberg, Germany, 2006; Volume 3919. [Google Scholar] [CrossRef]
- Sun, D.; Easley, R.F.; Kim, B.C. Optimal Digital Rights Management with Uncertain Piracy. Decis. Sci. 2015, 46, 165–191. [Google Scholar] [CrossRef]
- Naor, D.; Naor, M.; Lotspiech, J. Revocation and Tracing Schemes for Stateless Receivers. In Proceedings of the CRYPTO 2001: Advances in Cryptology, Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2001; Volume 2139, pp. 41–62. [Google Scholar]
- Mohamed, A.E.; Mostafa, R.; Elminir, H.K. A novel JFD scheme for DRM systems based on DWT and collusion resistance fingerprint encoding. Int. Arab J. Inf. Technol. 2016, 13, 842–850. [Google Scholar]
- Abdalla, H.; Hu, X.; Wahaballa, A.; Ali, A.A.; Ramadan, M.; Qin, Z. Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. Int. J. Netw. Secur. 2017, 19, 27–38. [Google Scholar]
- Tirkel, A.Z.; Rankin, G.A.; Van Schyndel, R.M.; Ho, W.J.; Mee, N.R.; Osborne, C.F. Electronic Watermarking. In Proceedings of the DICTA 1993, Sydney, Australia, 8–10 December 1993; pp. 666–672. [Google Scholar]
- Hartung, F.; Girod, B. Fast public-key watermarking of compressed video. In Proceedings of the International Conference on Image Processing, Santa Barbara, CA, USA, 26–29 October 1997; Volume 1, pp. 528–531. [Google Scholar] [CrossRef]
- Wong, P.W.; Memon, N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 2001, 10, 1593–1601. [Google Scholar] [CrossRef] [PubMed]
- Liu, R.; Tan, T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar] [CrossRef] [Green Version]
- Ma, Z.; Jiang, M. Secure and efficient DRM watermark algorithm of forensics in mobile internet. EURASIP J. Image Video Process. 2018, 2018, 69. [Google Scholar]
- Khadam, U.; Iqbal, M.M.; Azam, M.A.; Khalid, S.; Rho, S.; Chilamkurti, N. Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis. IEEE Access 2019, 7, 64955–64965. [Google Scholar] [CrossRef]
- Hu, H.; Lee, T. Frame-synchronized blind speech watermarking via improved adaptive mean modulation and perceptual-based additive modulation in DWT domain. Digit. Signal Process. 2019, 87, 75–85. [Google Scholar] [CrossRef]
- Loan, N.A.; Hurrah, N.N.; Parah, S.A.; Lee, J.W.; Sheikh, J.A.; Bhat, G.M. Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 2018, 6, 19876–19897. [Google Scholar] [CrossRef]
- Gonzalez-Lee, M.; Vazquez-Leal, H.; Gómez-Aguilar, J.F.; Morales-Mendoza, L.J.; Jimenez-Fernandez, V.M.; Camacho, J.R.L.; Ramón, C.M.C. Exploring the Cross-Correlation as a Means for Detecting Digital Watermarks and Its Reformulation into the Fractional Calculus Framework. IEEE Access 2018, 6, 71699–71718. [Google Scholar] [CrossRef]
- Ma, Z.; Huang, W.; Gao, H. A new blockchain-based trusted DRM scheme for built-in content protection. EURASIP J. Image Video Process. 2018, 2018, 91. [Google Scholar]
- Meng, Z.; Morizumi, T.; Miyata, S.; Kinoshita, H. Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018; Volume 2, pp. 359–364. [Google Scholar] [CrossRef]
- Barbareschi, M.; Cilardo, A.; Mazzeo, A. Partial FPGA bitstream encryption enabling hardware DRM in mobile environments. In Proceedings of the ACM International Conference on Computing Frontiers, Como, Italy, 16–19 May 2016; ACM: New York, NY, USA, 2016; pp. 443–448. [Google Scholar]
- Yang, Z.; Fan, K.; Lai, Y. Trusted Computing Based Mobile DRM Authentication Scheme. In Proceedings of the 2009 5th International Conference on Information Assurance and Security, Xi’an, China, 18–20 August 2009; Volume 1, pp. 7–10. [Google Scholar] [CrossRef]
- Lee, C.; Li, C.; Chen, Z.; Lai, Y.; Shieh, J. An improved E-DRM scheme for mobile environments. J. Inf. Sec. Appl. 2018, 39, 19–30. [Google Scholar] [CrossRef]
- Hasan, H.R.; Salah, K. Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts. IEEE Access 2018, 6, 65439–65448. [Google Scholar] [CrossRef]
- IPFS. IPFS Source Code in Github. Available online: https://github.com/ipfs (accessed on 25 May 2019).
- Das, S.; Ribeiro, V.J.; Anand, A. YODA: Enabling Computationally Intensive Contracts on Blockchains with Byzantine and Selfish Nodes; NDSS The Internet Society: San Diego, CA, USA, 2019. [Google Scholar]
- Al-Bassam, M.; Sonnino, A.; Bano, S.; Hrycyszyn, D.; Danezis, G. Chainspace: A Sharded Smart Contracts Platform; NDSS The Internet Society: San Diego, CA, USA, 2018. [Google Scholar]
- Dong, C.; Wang, Y.; Aldweesh, A.; McCorry, P.; van Moorsel, A. Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. In Proceedings of the ACM Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; ACM: New York, NY, USA, 2017; pp. 211–227. [Google Scholar]
- Mense, A.; Flatscher, M. Security Vulnerabilities in Ethereum Smart Contracts. In Proceedings of the 20th International Conference on Information Integration and Web-Based Applications & Services, IIWAS 2018, Yogyakarta, Indonesia, 19–21 November 2018; pp. 375–380. [Google Scholar] [CrossRef]
Y-DWMS | Abdalla et al. [5] | Mohamed et al. [4] | Barbareschi et al. [17] | Lee et al. [19] | Ma et al. [15] | Hasan et al. [20] | |
---|---|---|---|---|---|---|---|
Heavy cost of infringe-ment | √ | × | × | × | × | × | × |
Recovery of copyright losses | √ | × | × | × | × | × | × |
Undeniable reward and punishment | √ | × | × | × | × | × | × |
Tracking traitors | √ | × | √ | √ | √ | √ | √ |
Screen record prevention | √ | × | × | × | × | √ | × |
Independent from uni-que hardware | √ | √ | √ | × | × | √ | √ |
Symbols and Their Meanings | |
---|---|
R | Request package generated by user |
C | Smart contract corresponds with R. |
ES = {N, N, N…} | A small pseudo-random set of executions where miners execute C independently, ES is redefined after each round of MIRACLE. |
O = {T, T, T…} | Result set, saving results of each round of MIRACLE execution. The final result of C is selected from O. |
AN | Anchor node for the communication between ES and ¬ES |
N | Miners |
T | Tetrad of result |
Sig | Signature of miner N |
S&R | , (), representing result of RICE. |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, B.; Fang, L.; Zhang, H.; Ge, C.; Meng, W.; Liu, L.; Su, C. Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors 2019, 19, 3091. https://doi.org/10.3390/s19143091
Zhao B, Fang L, Zhang H, Ge C, Meng W, Liu L, Su C. Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors. 2019; 19(14):3091. https://doi.org/10.3390/s19143091
Chicago/Turabian StyleZhao, Bo, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, and Chunhua Su. 2019. "Y-DWMS: A Digital Watermark Management System Based on Smart Contracts" Sensors 19, no. 14: 3091. https://doi.org/10.3390/s19143091
APA StyleZhao, B., Fang, L., Zhang, H., Ge, C., Meng, W., Liu, L., & Su, C. (2019). Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors, 19(14), 3091. https://doi.org/10.3390/s19143091