{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:09:22Z","timestamp":1767139762647,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030341121"},{"type":"electronic","value":"9783030341138"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34113-8_23","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T17:03:47Z","timestamp":1574874227000},"page":"266-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Digital Media Copyright and Content Protection Using IPFS and Blockchain"],"prefix":"10.1007","author":[{"given":"Kwame Opuni-Boachie Obour","family":"Agyekum","sequence":"first","affiliation":[]},{"given":"Qi","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yansong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Christian Nii Aflah","family":"Cobblah","sequence":"additional","affiliation":[]},{"given":"Goodlet Akwasi","family":"Kusi","sequence":"additional","affiliation":[]},{"given":"Hanlin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jianbin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Vishwa, A., Hussain, F.K.: A blockchain based approach for multimedia privacy protection and provenance. In: IEEE Symposium Series on Computational Intelligence (SSCI), Bangalore, India, vol. 2018, pp. 1941\u20131945 (2018). https:\/\/doi.org\/10.1109\/SSCI.2018.8628636","DOI":"10.1109\/SSCI.2018.8628636"},{"key":"23_CR2","unstructured":"Qi, Y., Liu, X.: Digital copyright protection based on blockchain technology. In: 2018 International Journal of Knowledge and Language Processing, vol. 9, no. 2, pp. 61\u201370 (2018)"},{"key":"23_CR3","doi-asserted-by":"publisher","unstructured":"Bhowmik, D., Feng, T.: The multimedia blockchain: a distributed and tamper-proof media transaction framework. In: 2017 22nd International Conference on Digital Signal Processing (DSP), London, pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/ICDSP.2017.8096051","DOI":"10.1109\/ICDSP.2017.8096051"},{"key":"23_CR4","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P FileSystem, July 2014"},{"issue":"5","key":"23_CR5","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1002\/jsc.2146","volume":"26","author":"M McConaghy","year":"2017","unstructured":"McConaghy, M., McMullen, G., Parry, G., McConaghy, T., Holtzman, D.: Visibility and digital art: blockchain as an ownership layer on the Internet. Strateg. Change 26(5), 461\u2013470 (2017)","journal-title":"Strateg. Change"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., Akutsu, A.: The blockchain-based digital content distribution system. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing, Dalian, pp. 187\u2013190 (2015). https:\/\/doi.org\/10.1109\/BDCloud.2015.60","DOI":"10.1109\/BDCloud.2015.60"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1541\/ieejjia.6.252","volume":"2017","author":"Y Gao","year":"2017","unstructured":"Gao, Y., Nobuhara, H.: A decentralized trusted timestamping based on blockchains. IEEJ J. Ind. Appl. 2017, 252\u2013257 (2017). https:\/\/doi.org\/10.1541\/ieejjia.6.252","journal-title":"IEEJ J. Ind. Appl."},{"key":"23_CR8","unstructured":"How Mediachain Works. http:\/\/www.mediachain.io\/"},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Baumgart, I., Mies, S.: S\/Kademlia: a practicable approach towards secure key-based routing. In: 2007 International Conference on Parallel and Distributed Systems, Hsinchu, pp. 1\u20138 (2007). https:\/\/doi.org\/10.1109\/ICPADS.2007.4447808","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"23_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, October 2008. (cited on pp. 15 and 87) (2017). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Steichen, M., Pontiveros, B.F., Norvill, R., Shbair, W., et al.: Blockchain-based, decentralized access control for IPFS. In: The 2018 IEEE International Conference on Blockchain (Blockchain-2018), pp. 1499\u20131506. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00253"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"23_CR13","unstructured":"J. Herbert and A. Litchfield, A Novel Method for Decentralised Peer-to-peer Software License Validation Using Cryptocurrency Blockchain Technology, ACSC 2015, 2015(27)"},{"key":"23_CR14","unstructured":"Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic fingerprint -image generation. In: Proceedings 15th International Conference on Pattern Recognition, Barcelona, vol. 3, pp. 475\u2013478, September 2000"},{"key":"23_CR15","unstructured":"Cappelli, R., Maio, D., Maltoni, D.: Synthetic fingerprint -database generation. In: Proceedings 16th International Conference on Pattern Recognition, Quebec City, vol. 3, pp. 744\u2013747, August 2002"},{"key":"23_CR16","unstructured":"Bontrager, P., Togelius, J., Memon, N.: Deepmasterprint: generating fingerprints for presentation attacks. https:\/\/arxiv.org\/abs\/1705.07386 (2017)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-540-87403-4_20","volume-title":"Recent Advances in Intrusion Detection","author":"HJ Abdelnur","year":"2008","unstructured":"Abdelnur, H.J., State, R., Festor, O.: Advanced network fingerprinting. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 372\u2013389. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87403-4_20"},{"key":"23_CR18","unstructured":"Minaee, S., Abdolrashidi, A.: Finger-GAN: generating realistic fingerprint images using connectivity imposed GAN. arXiv preprint arXiv:1812.10482 (2018)"}],"container-title":["Lecture Notes in Computer Science","Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34113-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:04:30Z","timestamp":1693526670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-34113-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030341121","9783030341138"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34113-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icig2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.csig.org.cn\/detail\/2669","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}