CN109614775A - A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source - Google Patents

A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source Download PDF

Info

Publication number
CN109614775A
CN109614775A CN201811383542.6A CN201811383542A CN109614775A CN 109614775 A CN109614775 A CN 109614775A CN 201811383542 A CN201811383542 A CN 201811383542A CN 109614775 A CN109614775 A CN 109614775A
Authority
CN
China
Prior art keywords
file
user
rta
block chain
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811383542.6A
Other languages
Chinese (zh)
Inventor
陈志立
王玉婷
仲红
刘雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201811383542.6A priority Critical patent/CN109614775A/en
Publication of CN109614775A publication Critical patent/CN109614775A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses a kind of guard method that the copyright based on block chain is traced to the source, applied to by that can not be distorted with decentralization, data, the block chain of timing block chain characteristic, a supervision testing agency RTA, and act on the network environment that n user is constituted;Wherein UjIndicate j-th of user, 1≤j≤n, comprising: S1, generate double tagging stages;S2, pirate detection-phase;S3, registration documents stage;S4, pirate alert stage is fed back;S5, user feedback stage.The invention also discloses a kind of protect-ing frame structure that the copyright based on block chain is traced to the source.Testing agency is supervised in the present invention, and encryption generation unique identification Hash is carried out to file; local sensitivity algorithm generates local sensitivity Hash; and combine Hamming distance calculation document similarity; confirm original re-registration into copyright block chain; this method effectively solves the problems, such as that copyright risk of fraud and copyright registration mechanism efficiency are low during existing copyright protection, realize safe, the transparent and trusted of enrollment process.

Description

A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source
Technical field
The present invention relates to security of network and information technical field more particularly to a kind of guarantors that the copyright based on block chain is traced to the source Protect frame and method.
Background technique
Digital copyrighted work includes the character type works based on e-book, digital journals, network creator literature, and Digital audio, video.In China, since digital technology is to conventional copyright protection bring impact, the copyright of copyright cannot It is adequately protected, the equity of user often comes to harm, along with considerable netizen lacks good copyright protection consciousness And correctly digital consumer sight etc., cause digital publishing industrial chain not perfect, normal business cycle can not be carried out, number goes out Version industry is difficult to be developed in a healthy way.
Copyright block chain technology is one of the development that information technology is most great in the past few years, it is considered to be after mainframe, The subversiveness innovation of mode is calculated after PC, internet.It is one kind under peer to peer environment, by transparent and can Letter rule, building can not be forged, can not be distorted and retrospective piece of linked data structure, the mould of realization and management issued transaction Formula.Because the decentralization of copyright block chain goes trust, collective to safeguard, the characteristic of timing block chain, and is a kind of safe and reliable Database, so being studied and being applied extensively by scholar.The introducing of copyright block chain technology can eliminate existing digital publishing rights and step on Remember risk, eliminate papery colophon, then whole Transaction Informations in copyright are recorded in the account book of decentralization, this will Copyright risk of fraud is greatly reduced, while reducing copyright actuarial cost.
Accordingly, for internet area copyright protection facing challenges, it is badly in need of at present a kind of by copyright block chain technical application The protect-ing frame structure and method that the copyright based on block chain in digital publishing rights is traced to the source are provided to the sound development of digital publishing industry It ensures.
Summary of the invention
Technical problem to be solved by the present invention lies in provide a kind of decentralization by using copyright block chain, timing Block chain and the characteristic that can not be distorted are come the protect-ing frame structure and method of protecting the copyright based on block chain of the equity of user to trace to the source.
The present invention solves above-mentioned technical problem using following technical scheme:
A kind of guard method that the copyright based on block chain is traced to the source, this method be applied to by with decentralization, data not It can distort, the block chain of timing block chain characteristic, a supervision testing agency RTA, and act on the network rings that n user is constituted Border;Wherein UjIndicate j-th of user, 1≤j≤n, this method comprises the following steps:
S1, double tagging stages are generated: as a certain user UjSend the copyright M of oneself to RTA, including text, image, Video, audio, RTA carry out SHA256 encryption to M and generate unique identification cryptographic Hash ID;It is raw and by local sensitivity hash algorithm At corresponding local sensitivity cryptographic Hash LSHV;
S2, pirate detection-phase: this stage is divided into preliminary pirate detection and accurate pirate detection;Preliminary pirate detection: RTA Double labels of double labels of file and user file on copyright block chain are registered in by searching for, matching, calculate similarity;If The Hamming distance of LSHV is less than threshold value, i.e., preliminary pirate detection does not pass through, if user has doubt, Ke Yixiang to testing result RTA submits accurate pirate detection application;If the Hamming distance of LSHV is greater than threshold value, i.e., by preliminary pirate detection, RTA is by double marks Label are registered on block chain;
S3, registration documents stage: can be just registered by the copyright of detection to copyright block chain, registered content and included <ID, LSHV, FT, FF, SRTA>, wherein ID is the mark cryptographic Hash of file, and LSHV is the local sensitivity cryptographic Hash of file, and FT is File type, FF are file formats, and SRTA is the signature for supervising testing agency;
S4, feed back pirate alert stage: preliminary pirate detection or accurate pirate detection do not pass through, and RTA is stolen to user feedback Version warning;
S5, user feedback stage: three kinds of situations are specifically included;The file registration for being respectively as follows: (1) copyright block chain discloses It is bright, it, can be to RTA if being registered with doubt to file to the whole network node as it can be seen that user can inquire the information for being registered in block chain Double labels of doubt file are provided, the timestamp record of RTA combination copyright block chain accurately detects it, by detecting then It is registered on block chain, piracy is not fed back then by detection and is alerted to user;(2) it receives not through the use of preliminary pirate detection Family, if having doubt that can also send the application accurately detected result;(3) if user still have to the result accurately detected it is doubtful Justice, can apply for walking legal procedure, and the technology detection of this frame can provide support for legal decision.
As one of preferred embodiment of the invention, the double tagging stages of the generation of the step S1 specifically include following operation stream Journey:
(1) unique identification file: supervision testing agency generates the blocks of files of upload by SHA256 Encryption Algorithm unique Hash ID is identified, ID=SHA256 (M), wherein ID represents the mark cryptographic Hash of file;
(2) local sensitivity Hash is generated:
Text uses similar hash algorithm Simhash:
Participle: n characteristic key words are extracted;Hash and feature vector weighting: to each feature, with traditional hash algorithm One 64 cryptographic Hash b is generated to this feature;To i=1 to 64: if i-th of element that the i-th bit of b is 1, v adds the spy The weight of value indicative;Otherwise, if the i-th bit of b is that i-th of element of 0, v subtracts the weight of this feature value;Merge feature vector With dimensionality reduction: the corresponding binary string v of each feature is added, if i-th bit of the i-th bit element of v greater than 0, s is 1; Otherwise, if i-th bit of the i-th bit of v less than 0, s is 0;S is exported as the block local sensitivity cryptographic Hash LSHV finally required; Wherein LSHV represents the local sensitivity cryptographic Hash of file;
Image uses perceptual hash algorithm:
It reduces picture: using the size of 32*32, discrete cosine transform being facilitated to calculate;It is converted into grayscale image: scaling Picture afterwards is converted into the grayscale image of 256 ranks;DCT:DCT is calculated the set of picture separated component rate;DCT:DCT is reduced to calculate Matrix afterwards is 32*32, retains the 8*8 in the upper left corner, the low-limit frequency of these pictures represented;It calculates average value: calculating and reduce The average value of all pixels point after DCT;It further decreases DCT: greater than average value and is recorded as 1, otherwise be recorded as 0;Obtain office Portion's sensitive hash value: 64 information bits of combination, random the being consistent property of sequence;
As one of preferred embodiment of the invention, the pirate detection-phase of the step S2 specifically includes following operation stream Journey:
(1) preliminary pirate detection:
RTA obtains whole ID of same type file on copyright block chain first, compares the ID of user file, ID search If they are the same with result, supporting paper content is identical, is pirated file, completely pirate warning occurs;If ID search matching is not identical, Next it can be less than threshold value by file LSHV on calculating user and copyright block chain Hamming distance, Hamming distance, then have very It may be greatly pirated file, pirate warning occur;Hamming distance is greater than threshold value, it is believed that similarity is not high, without pirate suspicion, RTA By legal file < ID, LSHV, FT, FF, SRTA> be registered on copyright block chain;
(2) accurate pirate detection:
When user has doubt to the pirate warning received, double label applications can be submitted accurately to detect to RTA;RTA is as Tripartite finds out original by the ID of file, carries out the comparison or artificial judgement of original, final to determine whether this document belongs to It is pirate.
As one of preferred embodiment of the invention, the registration documents stage of the step S3 specifically includes following operation stream Journey:
(1) storage of double labels: double labels of file are stored on block chain, RTA is deposited double labels with transaction form Storage is in block body;
(2) it the storage of original: detects the original document finished and is selectively stored according to user demand, be stored in RTA's It is saved on cloud storage system or by user oneself;
(3) search original: RTA obtains the ID of registered file from copyright block chain, according to this ID, from cloud storage system System or user obtain the original that can not be distorted;
(4) user's checking: user query RTA uploads to the ID of copyright block chain, guarantees that RTA cannot arbitrarily change file Content and copyright are faked.
As one of preferred embodiment of the invention, the feedback piracy alert stage of the step S4 specifically includes following operation Process:
(1) the preliminary pirate warning of feedback: RTA sends ID, LSHV of the user file to user, registered in block chain ID, LSHV of similar documents, the technical report of block number and file detection, wherein the technical report of file detection is described in detail The detection method and testing result that RTA is used;According to different media types, RTA selects different media matching detection methods;Text Part ID cryptographic Hash is identical, the completely pirate warning of RTA feedback;The Hamming distance of local sensitivity cryptographic Hash is less than threshold value, then feedback section Divide pirate warning and provides the Hamming distance between similar documents;Last RTA signs to the message for being sent to user;
(2) the accurate pirate warning of feedback: RTA sends ID, LSHV of the user file to user, registered in block chain ID, LSHV of similar documents, the technical report of block number and file detection;Wherein the technical report of file detection includes similar original The segment of file and responsible person's signature of artificial detection;The file of particular/special requirement is not made to confidentiality, RTA finds legal copy according to ID Original is supplied to user, and last RTA signs to the message for being sent to user.
As one of preferred embodiment of the invention, generate in double tagging stages in the S1: RTA is for authenticating user's body Part, pirate detection and storage management, need real-name authentication when user transmits file to RTA.
As one of preferred embodiment of the invention, in the S2 piracy detection-phase: matching is registered in copyright block chain Double labels of upper file are unique identification cryptographic Hash ID and local sensitive hash value LSHV.
As one of preferred embodiment of the invention, in the S3 registration documents stage: the FT file type be file, Image, video or audio.
As one of preferred embodiment of the invention, in the S3 registration documents stage: the FF is that file format is text The corresponding format of part type, is PDF, WMV or WAV.
The invention also discloses a kind of protect-ing frame structure that the copyright based on block chain is traced to the source, which goes in by having Centralization, data can not distort, a supervision testing agency RTA of the block chain of timing block chain characteristic, and act on n user The network environment constituted;Wherein UjIndicate j-th of user, 1≤j≤n, which includes following module:
Generate double label models: for working as a certain user UjThe copyright M of oneself, including text, figure are sent to RTA Picture, video, audio, RTA carry out SHA256 encryption to M and generate unique identification cryptographic Hash ID;And pass through local sensitivity hash algorithm, Generate corresponding local sensitivity cryptographic Hash LSHV;
Pirate detection module: including preliminary pirate detection module and accurate pirate detection module;Preliminary piracy detection module: RTA is registered in double labels of double labels of file and user file on copyright block chain by search, matching, calculates similarity; If the Hamming distance of LSHV is less than threshold value, RTA will feed back piracy and be alerted to user, if user has doubt can copyright ownership To apply for accurate pirate detection.If the Hamming distance of LSHV is greater than threshold value, i.e., by preliminary pirate detection, RTA steps on double labels Remember on block chain;
Registration documents module: for will be registered by the copyright of detection to copyright block chain, register content include < ID, LSHV, FT, FF, SRTA >, wherein ID is the mark cryptographic Hash of file, and LSHV is the local sensitivity cryptographic Hash of file, and FT is File type, FF are file formats, and SRTA is the signature for supervising testing agency;Feed back pirate alert module: preliminary pirate detection Or accurate pirate detection does not pass through, RTA is alerted to user feedback piracy;
Feed back pirate alert module: for when preliminary pirate detection or accurate pirate detection do not pass through, RTA is to user feedback Piracy warning;
User feedback module: it is mainly used for realizing: (1) since the file registration of copyright block chain is open and clear, and to complete Net node is as it can be seen that work as user UjDoubt is registered with to the file on copyright block chain, by providing double marks of doubt file to RTA Label, RTA accurately detect it by user feedback module, record in conjunction with the timestamp of copyright block chain, by detecting then It is registered on block chain, piracy is not fed back then by detection and is alerted to user;(2) it receives not through the use of preliminary pirate detection Family, if having doubt that can also send the application accurately detected by user feedback module result;(3) if user is to accurate The result of detection still has doubt, can apply walking legal procedure by user feedback module, the technology detection of this frame can be method Rule judgement provides support.
The present invention compared with prior art the advantages of be: (1) present invention propose what a kind of copyright based on block chain was traced to the source Protect-ing frame structure and method, file are registered in transparent publicity on copyright block chain.
(2) present invention is firstly introduced supervision testing agency auxiliary calculation document similarity, registers copyright block chain in file Preliminary pirate detection is carried out before, weakens the pressure of copyright block chain registration documents.
(3) it present invention firstly provides the local sensitivity value of file and mark cryptographic Hash is combined, is stepped on copyright block chain Remember double Hash labels, using the decentralization of copyright block chain, can not distort with retrospective characteristic, make the registration of file data Process becomes transparent credible.The combination of double Hash labels simultaneously can achieve impact resistant effect while calculation document similarity Fruit.
(4) in terms of the present invention considers that memory space is required with efficiency, in such a way that storage inside and external storage combine, Original is stored in cloud storage system system or is saved by user, and corresponding cryptographic Hash is stored in copyright block chain, leads to ID is crossed to establish the link.
Detailed description of the invention
Fig. 1 is the network model figure of the embodiment of the present invention 1;
Fig. 2 be the embodiment of the present invention 1 based on copyright block chain copyright protection tracking source tracing method and frame it is main Implementation steps flow chart;
Fig. 3 is the Merkle tree structure chart that the copyright block chain of the embodiment of the present invention 1 stores double labels;
Fig. 4 is the step flow chart of the local sensitivity hash algorithm of the text of the embodiment of the present invention 1.
Specific embodiment
It elaborates below to the embodiment of the present invention, the present embodiment carries out under the premise of the technical scheme of the present invention Implement, the detailed implementation method and specific operation process are given, but protection scope of the present invention is not limited to following implementation Example.
The thought and theory of design of the invention: copyright block chain copyright protection has the advantage that 1, decentralization: Can to avoid centralization apply there are problems that lead to system global failure, each node is owned by newest on copyright block chain Full database copy, any destruction historical trading will not be played by only breaking through a small number of nodes;2, timing block chain, record All links: copyright block chain can record all traces that use and trade, and can trace copyright and use the overall process of transaction;3, no Reversible and can not distort, secure and trusted: the data of copyright block chained record can think distort through confirmation after an hour, Unless defeating the whole network 51% calculates power, therefore there is higher confidence level;4, node is safeguarded jointly: being broken from single-point entry data center The mode for carrying out copyright confirmation, may be implemented multinode entrance, and all nodes can see that complete copyright uses and traded Journey, the efficiency of copyright registration are apparently higher than conventional copyright pattern register.Although copyright block chain copyright protection have the advantages that it is above, But since magnanimity legal copy digital document needs relatively large space to store, secondly copyright block chain storage mass data at This meeting is relatively high.So the present invention needs to explore a kind of suitable data storage method.Meanwhile the legal registration of file needs A kind of efficient similarity comparison algorithm.Therefore data storage and computational problem are vital.
Based on the above design philosophy with theory and in order to protect the equity of user not encroached on, picture 1-4: the present embodiment 1 discloses a kind of guard method that the copyright based on block chain is traced to the source, and this method is applied to by with decentralization, data It can not distort, the block chain of timing block chain characteristic, a supervision testing agency RTA, and act on the network that n user is constituted Environment;Wherein UjIndicate j-th of user, 1≤j≤n, this method comprises the following steps:
S1, double tagging stages are generated: as a certain user UjSend the copyright M of oneself to RTA, including text, image, Video, audio, RTA carry out SHA256 encryption to M and generate unique identification cryptographic Hash ID;It is raw and by local sensitivity hash algorithm At corresponding local sensitivity cryptographic Hash LSHV;SHA256 Encryption Algorithm can resist birthday attack and differential attack etc., safety level It is not high.The effect of local sensitivity Hash is that high dimension vector is hashed into the number of a string of n-bit, when two cos angles are smaller (i.e. It is more similar) so they be hashed into two string number it is more close.Therefore, double labels are combined, so that it may reach mark text Part and the effect for calculating similitude.Before generating double labels, according to user information, digital watermarking is added in RTA hereof, comes Confirm the ownership of this document.This watermark being embedded into can be passage, mark, sequence number etc., and this watermark Usually invisible or can not examine, it and initial data are combined closely and are hidden wherein, and can undergo and some not destroy source The operation of data use value or commercial value and can preserve.Copyright block chain traces to the source protection technique in conjunction with traditional watermark Technology, file protecting effect is more preferably.
S2, pirate detection-phase: this stage is divided into preliminary pirate detection and accurate pirate detection;Preliminary pirate detection: RTA Double labels of double labels of file and user file on copyright block chain are registered in by searching for, matching, calculate similarity;If The Hamming distance of LSHV is less than threshold value, i.e., preliminary pirate detection does not pass through, and RTA feedback piracy is alerted to user, if user is right Testing result has doubt, and accurate pirate detection application can be submitted to RTA.If the Hamming distance of LSHV is greater than threshold value, that is, pass through Preliminary pirate detection RTA will be in double tag registrations to block chain;
S3, registration documents stage: can be just registered by the copyright of detection to copyright block chain, registered content and included < ID, LSHV, FT, FF, SRTA>, wherein ID is the mark cryptographic Hash of file, and LSHV is the local sensitivity cryptographic Hash of file, and FT is File type, FF are file format, SRTAIt is the signature for supervising testing agency;
S4, feed back pirate alert stage: preliminary pirate detection or accurate pirate detection do not pass through, and RTA is stolen to user feedback Version warning.
S5, user feedback stage: this stage can be subdivided into three phases.It is respectively as follows: the file registration of 1, copyright block chain It is open and clear, it, can be with if being registered with doubt to file to the whole network node as it can be seen that user can inquire the information for being registered in block chain Double labels of doubt file are provided to RTA, the timestamp record of RTA combination copyright block chain accurately detects it, passes through Detection is then registered on block chain, is not fed back piracy then by detection and is alerted to user.2, it receives not through preliminary pirate inspection The user of survey, if having doubt that can also send the application accurately detected result.If 3, user is to the result accurately detected Still there is doubt, can apply walking legal procedure, the technology detection of this frame can provide support for legal decision.
As one of preferred embodiment of the invention, the double tagging stages of the generation of the step S1 specifically include following operation stream Journey:
(1) unique identification file: supervision testing agency generates the blocks of files of upload by SHA256 Encryption Algorithm unique Hash ID is identified, ID=SHA256 (M), wherein ID represents the mark cryptographic Hash of file;
(2) local sensitivity Hash is generated:
Text uses similar hash algorithm Simhash:
Participle: n characteristic key words are extracted;Hash and feature vector weighting: to each feature, with traditional hash algorithm One 64 cryptographic Hash b is generated to this feature;To i=1 to 64: if i-th of element that the i-th bit of b is 1, v adds the spy The weight of value indicative;Otherwise, if the i-th bit of b is that i-th of element of 0, v subtracts the weight of this feature value;Merge feature vector With dimensionality reduction: the corresponding binary string v of each feature is added, if i-th bit of the i-th bit element of v greater than 0, s is 1; Otherwise, if i-th bit of the i-th bit of v less than 0, s is 0;S is exported as the block local sensitivity cryptographic Hash LSHV finally required; Wherein LSHV represents the local sensitivity cryptographic Hash of file;By " the 4-4-4 of two feature vectors citings, such as " University of Anhui " 4-4 4 " and " 5-5 5-5 55 " of " School of Computer Science " add up, obtain " 4+5-4-5-4+5 4-5-4+5 4+ 5 ", obtain " 9-9 1-1 19 ".If i-th bit of the i-th bit element of v greater than 0, s is 1;Otherwise, if the i-th bit of v Less than 0, then the i-th bit of s is 0.V []=" 9-9 1-1 1 " corresponding s []=" 10101 " in example.Export s conduct Final local sensitivity Hash.
Image uses perceptual hash algorithm:
It reduces picture: using the size of 32*32, discrete cosine transform being facilitated to calculate;It is converted into grayscale image: scaling Picture afterwards is converted into the grayscale image of 256 ranks;DCT:DCT is calculated the set of picture separated component rate;DCT:DCT is reduced to calculate Matrix afterwards is 32*32, retains the 8*8 in the upper left corner, the low-limit frequency of these pictures represented;It calculates average value: calculating and reduce The average value of all pixels point after DCT;It further decreases DCT: greater than average value and is recorded as 1, otherwise be recorded as 0;Obtain office Portion's sensitive hash value: 64 information bits of combination, random the being consistent property of sequence.The files such as video, audio also have corresponding part Sensitive hash calculation, the present embodiment are not just listed one by one.
As one of preferred embodiment of the invention, the pirate detection-phase of the step S2 specifically includes following operation stream Journey:
(1) preliminary pirate detection:
RTA obtains whole ID of same type file on copyright block chain first, compares the ID of user file, ID search If they are the same with result, supporting paper content is identical, is pirated file, completely pirate warning occurs;If ID search matching is not identical, Next can have by the Hamming distance for calculating file LSHV on user and copyright block chain if Hamming distance is less than threshold value It greatly may be very pirated file, pirate warning occur;Hamming distance is greater than threshold value, it is believed that similarity is not high, without pirate suspicion; RTA by legal file < ID, LSHV, FT, FF, SRTA> be registered on copyright block chain;For Hamming distance in text paper Empirical value is 3, and two text Hamming distances are less than 3, is just illustrated much like.For image, if different data bits is not More than 5, just illustrate that two images are much like;If it is greater than 10, just illustrate that this is two different images.
(2) accurate pirate detection:
When user has doubt to the pirate warning received, double label applications can be submitted accurately to detect to RTA.RTA is as Tripartite finds out original by the ID of file, carries out the comparison or artificial judgement of original, final to determine whether this document belongs to It is pirate.
As one of preferred embodiment of the invention, the registration documents stage of the step S3 specifically includes following operation stream Journey:
(1) storage of double labels: double labels are stored on block chain shown in Fig. 3;
(2) it the storage of original: detects the original document finished and is selectively stored according to user demand, be stored in RTA's It is saved on cloud storage system or by user oneself;
(3) search original: RTA obtains the ID of registered file from copyright block chain, according to this ID, from cloud storage system System or user obtain the original that can not be distorted;Since can be used for file complete for the superperformance of SHA256 hash function Integrity verification guarantees that the file that RTA is obtained is without the original document distorted;
(4) user's checking: user verifies the RTA ID for being uploaded to copyright block chain, and RTA is as in the present invention Tripartite does not need completely credible without true ability is changed.
As one of preferred embodiment of the invention, the feedback piracy alert stage of the step S4 specifically includes following operation Process:
(1) the preliminary pirate warning of feedback: RTA sends ID, LSHV of the user file to user, registered in block chain ID, LSHV of similar documents, the technical report of block number and file detection, wherein the technical report of file detection is described in detail The detection method and testing result that RTA is used;According to different media types, RTA selects different media matching detection methods;Text Part ID cryptographic Hash is identical, the completely pirate warning of RTA feedback;The Hamming distance of local sensitivity cryptographic Hash is less than threshold value, then feedback section Divide pirate warning and provides the Hamming distance between similar documents;Last RTA signs to the message for being sent to user.
(2) the accurate pirate warning of feedback: RTA sends ID, LSHV of the user file to user, registered in block chain ID, LSHV of similar documents, the technical report of block number and file detection;Wherein the technical report of file detection includes similar original The segment of file and responsible person's signature of artificial detection;The file of particular/special requirement is not made to confidentiality, RTA finds legal copy according to ID Original is supplied to user, and last RTA signs to the message for being sent to user.
As one of preferred embodiment of the invention, generate in double tagging stages in the S1: RTA is for authenticating user's body Part, pirate detection and storage management, need real-name authentication when user transmits file to RTA.
As one of preferred embodiment of the invention, in the S2 piracy detection-phase: matching is registered in copyright block chain Double labels of upper file are unique identification cryptographic Hash ID and local sensitive hash value LSHV.
As one of preferred embodiment of the invention, in the S3 registration documents stage: the FT file type be file, Image, video or audio.
As one of preferred embodiment of the invention, in the S3 registration documents stage: the FF is that file format is text The corresponding format of part type, wherein for PDF, WMV or WAV.
The invention also discloses a kind of protect-ing frame structure that the copyright based on block chain is traced to the source, which goes in by having Centralization, data can not distort, a supervision testing agency RTA of the block chain of timing block chain characteristic, and act on n user The network environment constituted;Wherein UjIndicate j-th of user, 1≤j≤n, which includes following module:
Generate double label models: for working as a certain user UjThe copyright M of oneself, including text, figure are sent to RTA Picture, video, audio, RTA carry out SHA256 encryption to M and generate unique identification cryptographic Hash ID;And pass through local sensitivity hash algorithm, Generate corresponding local sensitivity cryptographic Hash LSHV;
Pirate detection module: including preliminary pirate detection module and accurate pirate detection module;Preliminary piracy detection module: RTA is registered in double labels of double labels of file and user file on copyright block chain by search, matching, calculates similarity; If the Hamming distance of LSHV is less than threshold value, RTA will feed back piracy and be alerted to user, if user has doubt can copyright ownership To apply for accurate pirate detection.If the Hamming distance of LSHV is greater than threshold value, i.e., by preliminary pirate detection, RTA steps on double labels Remember on block chain;
Registration documents module: for will be registered by the copyright of detection to copyright block chain, register content include < ID, LSHV, FT, FF, SRTA >, wherein ID is the mark cryptographic Hash of file, and LSHV is the local sensitivity cryptographic Hash of file, and FT is File type, FF are file formats, and SRTA is the signature for supervising testing agency;Feed back pirate alert module: preliminary pirate detection Or accurate pirate detection does not pass through, RTA is alerted to user feedback piracy;
Feed back pirate alert module: for when preliminary pirate detection or accurate pirate detection do not pass through, RTA is to user feedback Piracy warning;
User feedback module: it is mainly used for realizing: (1) since the file registration of copyright block chain is open and clear, and to complete Net node is as it can be seen that work as user UjDoubt is registered with to the file on copyright block chain, by providing double marks of doubt file to RTA Label, RTA accurately detect it by user feedback module, record in conjunction with the timestamp of copyright block chain, by detecting then It is registered on block chain, piracy is not fed back then by detection and is alerted to user;(2) it receives not through the use of preliminary pirate detection Family, if having doubt that can also send the application accurately detected by user feedback module result;(3) if user is to accurate The result of detection still has doubt, can apply walking legal procedure by user feedback module, the technology detection of this frame can be method Rule judgement provides support.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of guard method that the copyright based on block chain is traced to the source, which is characterized in that this method is applied to go to center by having Change, data can not distort, the block chain of timing block chain characteristic, a supervision testing agency RTA, and act on n user institute structure At network environment;Wherein UjIndicate j-th of user, 1≤j≤n, this method comprises the following steps:
S1, double tagging stages are generated: as a certain user UjSend the copyright M of oneself to RTA, including text, image, video, Audio, RTA carry out SHA256 encryption to M and generate unique identification cryptographic Hash ID;And by local sensitivity hash algorithm, generates and correspond to Local sensitivity cryptographic Hash LSHV;
S2, pirate detection-phase: this stage is divided into preliminary pirate detection and accurate pirate detection;Preliminary pirate detection: RTA passes through Search, matching are registered in double labels of double labels of file and user file on copyright block chain, calculate similarity;If LSHV's Hamming distance is less than threshold value, i.e., preliminary pirate detection does not pass through, if user has doubt to testing result, can submit to RTA Accurate pirate detection application;If the Hamming distance of LSHV is greater than threshold value, i.e., by preliminary pirate detection, RTA is by double tag registrations Onto block chain;
S3, registration documents stage: can be just registered by the copyright of detection to copyright block chain, and registering content includes < ID, LSHV, FT, FF, SRTA>, wherein ID is the mark cryptographic Hash of file, and LSHV is the local sensitivity cryptographic Hash of file, and FT is file Type, FF are file format, SRTAIt is the signature for supervising testing agency;
S4, feed back pirate alert stage: preliminary pirate detection or accurate pirate detection do not pass through, and RTA is alert to user feedback piracy It accuses;
S5, user feedback stage: three kinds of situations are specifically included;The file registration for being respectively as follows: (1) copyright block chain is open and clear, To the whole network node as it can be seen that user can inquire the information for being registered in block chain, if being registered with doubt to file can provide to RTA The timestamp record of double labels of doubt file, RTA combination copyright block chain accurately detects it, is then registered by detection On block chain, piracy is not fed back then by detection and is alerted to user;(2) user not detected by preliminary piracy is received, If having doubt that can also send the application accurately detected result;(3) if user still has doubt to the result accurately detected, It can apply walking legal procedure, the technology detection of this frame can provide support for legal decision.
2. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that the step S1 The double tagging stages of generation specifically include following operating process:
(1) unique identification file: the blocks of files of upload is generated unique identification by SHA256 Encryption Algorithm by supervision testing agency Hash ID, ID=SHA256 (M), wherein ID represents the mark cryptographic Hash of file;
(2) local sensitivity Hash is generated:
Text uses similar hash algorithm Simhash:
Participle: n characteristic key words are extracted;Hash and feature vector weighting: to each feature, with traditional hash algorithm to this Feature generates 64 cryptographic Hash b;To i=1 to 64: if i-th of element that the i-th bit of b is 1, v adds this feature value Weight;Otherwise, if the i-th bit of b is that i-th of element of 0, v subtracts the weight of this feature value;Merge feature vector and drop Dimension: the corresponding binary string v of each feature is added, if i-th bit of the i-th bit element of v greater than 0, s is 1;It is no Then, if i-th bit of the i-th bit of v less than 0, s is 0;S is exported as the block local sensitivity cryptographic Hash LSHV finally required;Its Middle LSHV represents the local sensitivity cryptographic Hash of file;
Image uses perceptual hash algorithm:
It reduces picture: using the size of 32*32, discrete cosine transform being facilitated to calculate;It is converted into grayscale image: after scaling Picture is converted into the grayscale image of 256 ranks;DCT:DCT is calculated the set of picture separated component rate;After reducing DCT:DCT calculating Matrix is 32*32, retains the 8*8 in the upper left corner, the low-limit frequency of these pictures represented;It calculates average value: calculating after reducing DCT All pixels point average value;It further decreases DCT: greater than average value and is recorded as 1, otherwise be recorded as 0;Obtain local sensitivity Cryptographic Hash: 64 information bits of combination, random the being consistent property of sequence.
3. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that the step S2 Pirate detection-phase specifically include following operating process:
(1) preliminary pirate detection:
RTA obtains whole ID of same type file on copyright block chain first, compares the ID of user file, ID search matching knot If they are the same, supporting paper content is identical for fruit, is pirated file, completely pirate warning occurs;If ID search matching is not identical, connect down To be less than threshold value by the Hamming distance of file LSHV on calculating user and copyright block chain, Hamming distance, then have and greatly may be used very much It can be pirated file, pirate warning occur;Hamming distance is greater than threshold value, it is believed that similarity is not high, and without pirate suspicion, RTA will just Version file < ID, LSHV, FT, FF, SRTA> be registered on copyright block chain;
(2) accurate pirate detection:
When user has doubt to the pirate warning received, double label applications can be submitted accurately to detect to RTA;RTA as third party, Original is found out by the ID of file, carries out the comparison or artificial judgement of original, it is final to determine whether this document belongs to piracy.
4. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that the step S3 The registration documents stage specifically include following operating process:
(1) storage of double labels: double labels of file are stored on block chain, double labels are stored in by RTA with transaction form In block body;
(2) it the storage of original: detects the original document finished and is selectively stored according to user demand, the cloud for being stored in RTA is deposited It is saved on storage system or by user oneself;
(3) search original: RTA obtains the ID of registered file from copyright block chain, according to this ID, from cloud storage system or Person user obtains the original that can not be distorted;
(4) user's checking: user query RTA uploads to the ID of copyright block chain, guarantees that RTA cannot arbitrarily change file content It fakes with copyright.
5. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that the step S4 Feedback piracy alert stage specifically include following operating process:
(1) the preliminary pirate warning of feedback: RTA sends ID, LSHV of the user file to user, registered similar in block chain ID, LSHV of file, the technical report of block number and file detection, wherein the technical report of file detection is described in detail RTA and adopts Detection method and testing result;According to different media types, RTA selects different media matching detection methods;File ID Cryptographic Hash is identical, the completely pirate warning of RTA feedback;The Hamming distance of local sensitivity cryptographic Hash is less than threshold value, then feedback fraction is stolen Version alerts and provides the Hamming distance between similar documents;Last RTA signs to the message for being sent to user;
(2) the accurate pirate warning of feedback: RTA sends ID, LSHV of the user file to user, registered similar in block chain ID, LSHV of file, the technical report of block number and file detection;Wherein the technical report of file detection includes similar original Segment and artificial detection responsible person signature;The file of particular/special requirement is not made to confidentiality, RTA finds legal original text according to ID Part is supplied to user, and last RTA signs to the message for being sent to user.
6. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that raw in the S1 In tagging stage in pairs: RTA is needed for authenticating user identity, pirate detection and storage management when user transmits file to RTA Want real-name authentication.
7. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that stolen in the S2 In version detection-phase: it is unique identification cryptographic Hash ID and local sensitivity Kazakhstan that matching, which is registered in double labels of file on copyright block chain, Uncommon value LSHV.
8. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that stepped in the S3 Remember in document stage: the FT file type is file, image, video or audio.
9. the guard method that the copyright according to claim 1 based on block chain is traced to the source, which is characterized in that stepped in the S3 Remember in document stage: the FF is that file format is the corresponding format of file type, is PDF, WMV or WAV.
10. a kind of protect-ing frame structure that -9 any copyrights based on block chain are traced to the source according to claim 1, feature exist In, the frame application in by that can not be distorted with decentralization, data, a supervision of the block chain of timing block chain characteristic detects Mechanism RTA, and act on the network environment that n user is constituted;Wherein UjIndicate j-th of user, 1≤j≤n, the frame packet Include following module:
Generate double label models: for working as a certain user UjThe copyright M of oneself, including text, image, view are sent to RTA Frequently, audio, RTA carry out SHA256 encryption to M and generate unique identification cryptographic Hash ID;And by local sensitivity hash algorithm, generate Corresponding local sensitivity cryptographic Hash LSHV;
Pirate detection module: including preliminary pirate detection module and accurate pirate detection module;Preliminary piracy detection module: RTA Double labels of double labels of file and user file on copyright block chain are registered in by searching for, matching, calculate similarity;If The Hamming distance of LSHV is less than threshold value, and RTA will feed back piracy and be alerted to user, if user has doubt can be with copyright ownership The accurate pirate detection of application.If the Hamming distance of LSHV is greater than threshold value, i.e., by preliminary pirate detection, RTA is by double tag registrations Onto block chain;
Registration documents module: for will be registered by the copyright of detection to copyright block chain, registering content includes < ID, LSHV, FT, FF, SRTA >, wherein ID is the mark cryptographic Hash of file, and LSHV is the local sensitivity cryptographic Hash of file, and FT is file Type, FF are file formats, and SRTA is the signature for supervising testing agency;Feed back pirate alert module: preliminary pirate detection or essence Really pirate detection does not pass through, and RTA is alerted to user feedback piracy;
Feed back pirate alert module: for when preliminary piracy detection or accurate pirate detection do not pass through, RTA to be pirate to user feedback Warning;
User feedback module: it is mainly used for realizing: (1) since the file registration of copyright block chain is open and clear, and to the whole network section Point is as it can be seen that work as user UjDoubt is registered with to the file on copyright block chain, by providing double labels of doubt file to RTA, RTA accurately detects it by user feedback module, records in conjunction with the timestamp of copyright block chain, is then registered by detection On block chain, piracy is not fed back then by detection and is alerted to user;(2) user not detected by preliminary piracy is received, If having doubt that can also send the application accurately detected by user feedback module result;(3) if user is to accurate inspection The result of survey still has doubt, can apply walking legal procedure by user feedback module, the technology detection of this frame can be law Judgement provides support.
CN201811383542.6A 2018-11-20 2018-11-20 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source Pending CN109614775A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811383542.6A CN109614775A (en) 2018-11-20 2018-11-20 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811383542.6A CN109614775A (en) 2018-11-20 2018-11-20 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source

Publications (1)

Publication Number Publication Date
CN109614775A true CN109614775A (en) 2019-04-12

Family

ID=66004306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811383542.6A Pending CN109614775A (en) 2018-11-20 2018-11-20 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source

Country Status (1)

Country Link
CN (1) CN109614775A (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263505A (en) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 Image processing method and device based on block chain
CN110287048A (en) * 2019-05-09 2019-09-27 清华大学 Data exception detection method and device
CN110472201A (en) * 2019-07-26 2019-11-19 阿里巴巴集团控股有限公司 Based on the text similarity detection method and device of block chain, electronic equipment
CN110598372A (en) * 2019-08-13 2019-12-20 数字视觉云(北京)科技发展有限公司 Block chain-based digital copyright protection method
CN110809762A (en) * 2019-05-20 2020-02-18 阿里巴巴集团控股有限公司 Identifying copyrighted material using embedded copyright information
CN110909082A (en) * 2019-12-02 2020-03-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain certificate of works
WO2019141292A3 (en) * 2019-05-20 2020-04-02 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
CN111090837A (en) * 2019-12-06 2020-05-01 上海科乐宜信息科技有限公司 Intelligent tracking method based on block chain technology
CN111368362A (en) * 2020-03-06 2020-07-03 广联达科技股份有限公司 Building model component protection method and system based on block chain
US10755252B1 (en) 2019-05-20 2020-08-25 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111753265A (en) * 2020-06-16 2020-10-09 哈尔滨工业大学 Block chain-based original work registration and protection method and system
US10909317B2 (en) 2019-07-26 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
US10922422B2 (en) 2019-05-13 2021-02-16 Advanced New Technologies Co., Ltd. Blockchain-based image processing method and apparatus
US10949936B2 (en) 2019-05-20 2021-03-16 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in tables
US11017061B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
US11036834B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded timestamped copyright information
US11037469B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Copyright protection based on hidden copyright information
US11042612B2 (en) 2019-05-20 2021-06-22 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
CN113190859A (en) * 2021-04-29 2021-07-30 湖北央中巨石信息技术有限公司 Data hierarchical encryption method based on block chain
JP2022511326A (en) * 2019-09-29 2022-01-31 テンセント・テクノロジー・(シェンジェン)・カンパニー・リミテッド Blockchain-based content processing methods, devices, devices and storage media
CN114065150A (en) * 2021-11-22 2022-02-18 安徽大学 Picture copyright protection method
CN114401092A (en) * 2021-12-17 2022-04-26 浙江工商大学 Image file sharing platform infringement protection method based on block chain and IPFS
CN114756627A (en) * 2022-06-10 2022-07-15 杭州链城数字科技有限公司 Alliance-chain-based digital asset processing method, system and storage medium
CN114780919A (en) * 2022-04-26 2022-07-22 山东浪潮超高清视频产业有限公司 Block chain copyright determination method based on video genes
CN114996664A (en) * 2022-06-13 2022-09-02 中国科学院沈阳自动化研究所 Block chain-based digital copyright protection method
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method
CN114996664B (en) * 2022-06-13 2024-04-23 中国科学院沈阳自动化研究所 Digital copyright protection method based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PAULZHAO6518: ""相似性相关pHash和simhash(https://blog.csdn.net/qq_41853758/article/details/82720722)"", 《CSDN》 *
韩红旗: "《语义指纹著者姓名消歧理论及应用》", 31 July 2018 *

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287048A (en) * 2019-05-09 2019-09-27 清华大学 Data exception detection method and device
WO2020228366A1 (en) * 2019-05-13 2020-11-19 创新先进技术有限公司 Picture processing method and apparatus based on block chain
CN110263505A (en) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 Image processing method and device based on block chain
US11188660B2 (en) 2019-05-13 2021-11-30 Advanced New Technologies Co., Ltd. Blockchain-based image processing method and apparatus
CN110263505B (en) * 2019-05-13 2021-02-23 创新先进技术有限公司 Picture processing method and device based on block chain
US10922422B2 (en) 2019-05-13 2021-02-16 Advanced New Technologies Co., Ltd. Blockchain-based image processing method and apparatus
US11288345B2 (en) 2019-05-20 2022-03-29 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded timestamped copyright information
US11080671B2 (en) 2019-05-20 2021-08-03 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11409850B2 (en) 2019-05-20 2022-08-09 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US10755252B1 (en) 2019-05-20 2020-08-25 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
US11256787B2 (en) 2019-05-20 2022-02-22 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11227351B2 (en) 2019-05-20 2022-01-18 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
WO2019141292A3 (en) * 2019-05-20 2020-04-02 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
US11216898B2 (en) 2019-05-20 2022-01-04 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in tables
WO2019141295A3 (en) * 2019-05-20 2021-09-16 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
US11106766B2 (en) 2019-05-20 2021-08-31 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
CN110809762A (en) * 2019-05-20 2020-02-18 阿里巴巴集团控股有限公司 Identifying copyrighted material using embedded copyright information
US10949936B2 (en) 2019-05-20 2021-03-16 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in tables
US11062000B2 (en) 2019-05-20 2021-07-13 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11017060B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11017061B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
US11036834B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded timestamped copyright information
US11037469B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Copyright protection based on hidden copyright information
US11042612B2 (en) 2019-05-20 2021-06-22 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11056023B2 (en) 2019-05-20 2021-07-06 Advanced New Technologies Co., Ltd. Copyright protection based on hidden copyright information
US11100284B2 (en) 2019-07-26 2021-08-24 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
CN110472201A (en) * 2019-07-26 2019-11-19 阿里巴巴集团控股有限公司 Based on the text similarity detection method and device of block chain, electronic equipment
US10909317B2 (en) 2019-07-26 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based text similarity detection method, apparatus and electronic device
CN110598372A (en) * 2019-08-13 2019-12-20 数字视觉云(北京)科技发展有限公司 Block chain-based digital copyright protection method
JP7085063B2 (en) 2019-09-29 2022-06-15 テンセント・テクノロジー・(シェンジェン)・カンパニー・リミテッド Blockchain-based content processing methods, devices, devices and storage media
JP2022511326A (en) * 2019-09-29 2022-01-31 テンセント・テクノロジー・(シェンジェン)・カンパニー・リミテッド Blockchain-based content processing methods, devices, devices and storage media
CN110909082A (en) * 2019-12-02 2020-03-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain certificate of works
CN111090837A (en) * 2019-12-06 2020-05-01 上海科乐宜信息科技有限公司 Intelligent tracking method based on block chain technology
CN111368362A (en) * 2020-03-06 2020-07-03 广联达科技股份有限公司 Building model component protection method and system based on block chain
CN111753265A (en) * 2020-06-16 2020-10-09 哈尔滨工业大学 Block chain-based original work registration and protection method and system
US11361054B2 (en) 2020-08-14 2022-06-14 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain-based infringement detection method, apparatus, and electronic device
CN112650978A (en) * 2020-08-14 2021-04-13 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111737654B (en) * 2020-08-14 2020-12-11 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN113190859A (en) * 2021-04-29 2021-07-30 湖北央中巨石信息技术有限公司 Data hierarchical encryption method based on block chain
CN114065150A (en) * 2021-11-22 2022-02-18 安徽大学 Picture copyright protection method
CN114065150B (en) * 2021-11-22 2024-03-05 安徽大学 Picture copyright protection method
CN114401092A (en) * 2021-12-17 2022-04-26 浙江工商大学 Image file sharing platform infringement protection method based on block chain and IPFS
CN114780919A (en) * 2022-04-26 2022-07-22 山东浪潮超高清视频产业有限公司 Block chain copyright determination method based on video genes
CN114780919B (en) * 2022-04-26 2024-03-29 山东浪潮超高清视频产业有限公司 Block chain copyright right determining method based on video genes
CN114756627B (en) * 2022-06-10 2022-09-30 杭州链城数字科技有限公司 Alliance-chain-based digital asset processing method, system and storage medium
CN114756627A (en) * 2022-06-10 2022-07-15 杭州链城数字科技有限公司 Alliance-chain-based digital asset processing method, system and storage medium
CN114996664A (en) * 2022-06-13 2022-09-02 中国科学院沈阳自动化研究所 Block chain-based digital copyright protection method
CN114996664B (en) * 2022-06-13 2024-04-23 中国科学院沈阳自动化研究所 Digital copyright protection method based on block chain
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method

Similar Documents

Publication Publication Date Title
CN109614775A (en) A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source
Farfoura et al. A novel blind reversible method for watermarking relational databases
Han et al. Content-based image authentication: current status, issues, and challenges
Zhang et al. Relational databases watermarking for textual and numerical data
Bedi et al. A new watermarking approach for non-numeric relational database
Hasan et al. Image authentication based on watermarking approach
Iftikhar et al. A survey on reversible watermarking techniques for relational databases
CN102024245B (en) Fragile watermarking technology-based electronic seal protection method
Schäler et al. Reliable provenance information for multimedia data using invertible fragile watermarks
Martínez et al. On watermarking for collaborative model-driven engineering
Bedi et al. A unique approach for watermarking non-numeric relational database
Mehta et al. Watermarking for security in database: A review
Jain et al. Fragile watermarking for image authentication: survey
Chai et al. A robust and reversible watermarking technique for relational dataset based on clustering
Jaiswal et al. Implementation of a new technique for web document protection using unicode
Hwang et al. A reversible hiding technique using LSB matching for relational databases
Mohanpurkar et al. Applying watermarking for copyright protection, traitor identification and joint ownership: A review
CN111061695B (en) File sharing method and system based on block chain
Tsai et al. A database watermarking technique for temper detection
Khadam et al. Data aggregation and privacy preserving using computational intelligence
Ma et al. LBP feature and hash function based dual watermarking algorithm for database
Murugan et al. A robust watermarking technique for copyright protection for relational databases
Alfagi et al. A systematic literature review on necessity, challenges, applications and attacks of watermarking relational database
Pandey et al. Alternative shift algorithm for digital watermarking on text
Chathuranga Watermarking technology for copyright protection of relational databases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412

RJ01 Rejection of invention patent application after publication