{"title":"基于以太坊区块链的图像数据部分区域所有权保护系统","authors":"Natsuki Fujiwara, Shohei Yokoyama","doi":"10.2298/csis230320061f","DOIUrl":null,"url":null,"abstract":"Our proposed method utilizes blockchain technology to safeguard the ownership of specific regions within image data. In our approach, diverse values could be assigned to each region based on its importance, and only users with ownership rights can access these designated regions. This ensures the protection of ownership rights for individuals in any given region of an image. Identified regions are individually encrypted using an XOR cipher, and a corresponding key image is generated for decryption, thereby preserving the privacy of the encrypted region. Non-fungible tokens (NFTs) are employed to protect the key image and manage the ownership of each object in the image data. The NFT for the key image is generated by the key holder (who possesses the entire image), and the ownership NFT is acquired by the user who needs access to the key NFT. Furthermore, the ownership NFT and the key NFT are verified for a match by the judgment function, and only upon successful validation, the NFT is displayed on the screen. This method enables different values to be assigned to various parts of an image, facilitating the transfer and sharing of ownership. Additionally, the original image?s owner can benefit financially based on the value of the image, thus enhancing the overall security of image data.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"65 1","pages":"0"},"PeriodicalIF":1.2000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ownership protection system for partial areas on image data using ethereum blockchain\",\"authors\":\"Natsuki Fujiwara, Shohei Yokoyama\",\"doi\":\"10.2298/csis230320061f\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Our proposed method utilizes blockchain technology to safeguard the ownership of specific regions within image data. In our approach, diverse values could be assigned to each region based on its importance, and only users with ownership rights can access these designated regions. This ensures the protection of ownership rights for individuals in any given region of an image. Identified regions are individually encrypted using an XOR cipher, and a corresponding key image is generated for decryption, thereby preserving the privacy of the encrypted region. Non-fungible tokens (NFTs) are employed to protect the key image and manage the ownership of each object in the image data. The NFT for the key image is generated by the key holder (who possesses the entire image), and the ownership NFT is acquired by the user who needs access to the key NFT. Furthermore, the ownership NFT and the key NFT are verified for a match by the judgment function, and only upon successful validation, the NFT is displayed on the screen. This method enables different values to be assigned to various parts of an image, facilitating the transfer and sharing of ownership. Additionally, the original image?s owner can benefit financially based on the value of the image, thus enhancing the overall security of image data.\",\"PeriodicalId\":50636,\"journal\":{\"name\":\"Computer Science and Information Systems\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science and Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2298/csis230320061f\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science and Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2298/csis230320061f","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Ownership protection system for partial areas on image data using ethereum blockchain
Our proposed method utilizes blockchain technology to safeguard the ownership of specific regions within image data. In our approach, diverse values could be assigned to each region based on its importance, and only users with ownership rights can access these designated regions. This ensures the protection of ownership rights for individuals in any given region of an image. Identified regions are individually encrypted using an XOR cipher, and a corresponding key image is generated for decryption, thereby preserving the privacy of the encrypted region. Non-fungible tokens (NFTs) are employed to protect the key image and manage the ownership of each object in the image data. The NFT for the key image is generated by the key holder (who possesses the entire image), and the ownership NFT is acquired by the user who needs access to the key NFT. Furthermore, the ownership NFT and the key NFT are verified for a match by the judgment function, and only upon successful validation, the NFT is displayed on the screen. This method enables different values to be assigned to various parts of an image, facilitating the transfer and sharing of ownership. Additionally, the original image?s owner can benefit financially based on the value of the image, thus enhancing the overall security of image data.
期刊介绍:
About the journal
Home page
Contact information
Aims and scope
Indexing information
Editorial policies
ComSIS consortium
Journal boards
Managing board
For authors
Information for contributors
Paper submission
Article submission through OJS
Copyright transfer form
Download section
For readers
Forthcoming articles
Current issue
Archive
Subscription
For reviewers
View and review submissions
News
Journal''s Facebook page
Call for special issue
New issue notification
Aims and scope
Computer Science and Information Systems (ComSIS) is an international refereed journal, published in Serbia. The objective of ComSIS is to communicate important research and development results in the areas of computer science, software engineering, and information systems.