Blockchain-Based Multimedia Content Protection

Blockchain-Based Multimedia Content Protection

Copyright: © 2023 |Pages: 26
DOI: 10.4018/978-1-6684-6864-7.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter presents a comprehensive overview of the methods and applications of blockchain technology for multimedia content security. These applications are categorised using a taxonomy that takes into account the technical features of blockchain technology, types of blockchain, content protection strategies including encryption, digital rights management, digital watermarking, and fingerprinting (or transaction tracing), as well as performance standards. Moreover, multimedia-based content protection techniques have been covered in this chapter. According to a review of the literature, there is currently no comprehensive and organised taxonomy specifically devoted to blockchain-based content protection solutions. The comparative study is of the most noticeable work done on blockchain-based content protection techniques, which is highly cited by the authors.
Chapter Preview
Top

Introduction

A peer-to-peer network called a blockchain provides security for multimedia assets like photographs, audio, video, and more. Technology for multimedia protection shields data from dangers posed by unauthorised users, particularly in network environments [1]. Multimedia data is susceptible to dangers like eavesdropping, malicious alteration, illicit distribution, copying, watermarking, and more, especially in network situations. In this chapter, the authors are mainly focused on various methods of how to secure the multimedia related content which helps to preserve the protected properties include the confidentiality, integrity, ownership, authorization. Blockchain is a decentralized peer-to-peer network and stores the information electronically in digital format. As a result of decentralization, cryptocurrencies are not issued by any centralized organization, such as a bank or the government [2-3]. Mining, a procedure in which transactions are processed and verified by a network of computers, is used to maintain and confirm cryptographic algorithms that are used to safeguard these. As a result of this process, the network's miners receive rewards in the form of cryptocurrencies. Like real money, cryptocurrencies can be sold or swapped for one another since they are fungible.

The blockchain is used in many real-time multimedia applications like IoT, business, healthcare, energy, agriculture, multimedia content security becomes important and urgent. etc. Using blockchain we can track the transactions like tracking digital use & payments for content creators like in image distribution for photographers. Blockchain-based alternative gives artists more control over how multimedia related data spread among dearest [4-6]. Using blockchain we can provide security and privacy to multimedia or information transfer and can track the products [8-10]. We can leverage blockchain in the medical sector to provide peer-to-peer health checks. Blockchain technology may be used to verify the legitimacy of unique product, shipment, and document identifiers as well as to store permanent records of transactions [6-7]. Four types of blockchain networks now available are public, private, hybrid and consortium as illustrated in Figure 1.

Figure 1.

Classification of blockchain

978-1-6684-6864-7.ch005.f01
  • 1.

    Public blockchain: This is where distributed ledger technology (DLT) first emerged and where Bitcoin and other cryptocurrencies first surfaced. The public blockchain has no limitations and requires no permissions. The mining and trading of digital currency like Bitcoin is the most well-known use of public blockchains. Electronic notarization of affidavits and public property ownership paperwork are just two examples of how it can be used to keep a continuous record with a traceable chain of proof. Two of the most well-known public blockchains are those for bitcoin and ethereum [8-13].

  • 2.

    Private blockchain: It works in a constrained network, or is managed by a single entity. Private blockchain uses include supply chain management, asset ownership etc.

  • 3.

    Hybrid blockchain: Both public and private blockchains are present. In order to regulate who has access to certain blockchain data and what information is made public, it enables enterprises to create both a private, permission-based system and a public, permission-less system. One of the many intriguing applications of hybrid blockchain is real estate. A hybrid blockchain can be used by businesses to run systems safely while simultaneously exposing some data to the public, like listings. Retailers who use hybrid blockchain can streamline their operations, and it can also benefit heavily regulated industries like the financial services sector. The hybrid blockchain can be used to store medical records [3].

  • 4.

    Consortium blockchain: A consortium blockchain mixes private and public blockchain property in the same way that a hybrid blockchain does. It differs in that it involves several organisational members working together on a decentralised network. A consortium blockchain removes the hazards related to a private blockchain maintained by a single organisation by restricting access to a certain group. The preset nodes on this blockchain are in charge of the consensus techniques. It has a validator node that handles transaction initiation, receipt, and validation. Member nodes have the ability to initiate or receive transactions. This kind of blockchain could be utilised for payments and banking [12-13].

Complete Chapter List

Search this Book:
Reset