{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:17:44Z","timestamp":1774019864321,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"32","license":[{"start":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T00:00:00Z","timestamp":1708732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T00:00:00Z","timestamp":1708732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041"],"award-info":[{"award-number":["61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18514-3","type":"journal-article","created":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T07:02:36Z","timestamp":1708758156000},"page":"77267-77302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Digital image copyright protection method based on blockchain and zero trust mechanism"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1488-388X","authenticated-orcid":false,"given":"Qiu-yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guo-rui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jia-yan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,24]]},"reference":[{"key":"18514_CR1","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1109\/TIFS.2022.3186791","volume":"17","author":"M Zhao","year":"2022","unstructured":"Zhao M, Wang B, Wang W, Kong Y, Zheng T, Ren K (2022) Guided Erasable Adversarial Attack (GEAA) toward shared data protection. IEEE Trans Inf Forensics Secur 17:2468\u20132482. https:\/\/doi.org\/10.1109\/TIFS.2022.3186791","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"18514_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159131","author":"D Zhang","year":"2022","unstructured":"Zhang D, Wu XJ, Xu T, Kittler J (2022) WATCH: two-stage discrete cross-media hashing. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/TKDE.2022.3159131","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"18514_CR3","doi-asserted-by":"publisher","unstructured":"Yan Z (2021) The color and artistic features of murals in Dunhuang cave 465 in Mogao Grottoes. The 6th International Conference on Arts, Design and Contemporary Education (ICADCE2020). Atlantis Press, 56\u201362. https:\/\/doi.org\/10.2991\/assehr.k.210106.012","DOI":"10.2991\/assehr.k.210106.012"},{"key":"18514_CR4","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.engappai.2016.07.003","volume":"55","author":"CW Lin","year":"2016","unstructured":"Lin CW, Wu TY, Fournier-Viger P, Lin G, Zhan J (2016) Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng Appl Artif Intell 55:269\u2013284. https:\/\/doi.org\/10.1016\/j.engappai.2016.07.003","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"18514_CR5","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10489-015-0671-0","volume":"44","author":"P Cheng","year":"2016","unstructured":"Cheng P, Roddick JF, Chu SC, Lin CW (2016) Privacy preservation through a greedy, distortion-based rule-hiding method. Appl Intell 44(2):295\u2013306. https:\/\/doi.org\/10.1007\/s10489-015-0671-0","journal-title":"Appl Intell"},{"issue":"1","key":"18514_CR6","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1186\/s12911-020-01275-y","volume":"20","author":"M Sultana","year":"2020","unstructured":"Sultana M, Hossain A, Laila F, Taher K, Lslam M (2020) Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med Inform Decis Mak 20(1):256. https:\/\/doi.org\/10.1186\/s12911-020-01275-y. (1-10)","journal-title":"BMC Med Inform Decis Mak"},{"key":"18514_CR7","doi-asserted-by":"publisher","unstructured":"Wylde A (2021) Zero trust: never trust, always verify. 2021 international conference on cyber situational awareness, data analytics and assessment (cybersa). IEEE, 1\u20134. https:\/\/doi.org\/10.1109\/CyberSA52016.2021.9478244","DOI":"10.1109\/CyberSA52016.2021.9478244"},{"key":"18514_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6493306","volume":"6493306","author":"J Zheng","year":"2021","unstructured":"Zheng J, Teng S, Li P, Ou W, Zhou D, Ye J (2021) A novel video copyright protection scheme based on blockchain and double watermarking. Secur Commun Netw 6493306:1\u201316. https:\/\/doi.org\/10.1155\/2021\/6493306","journal-title":"Secur Commun Netw"},{"key":"18514_CR9","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/j.isatra.2021.06.019","volume":"125","author":"C Wang","year":"2022","unstructured":"Wang C, Ma B, Xia Z, Li J, Li Q, Liu X, Sang S (2022) Geometric resistant polar quaternion discrete fourier transform and its application in color image zero-hiding. ISA Trans 125:665\u2013680. https:\/\/doi.org\/10.1016\/j.isatra.2021.06.019","journal-title":"ISA Trans"},{"issue":"4","key":"18514_CR10","doi-asserted-by":"publisher","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","volume":"118","author":"P Kadian","year":"2021","unstructured":"Kadian P, Arora SM, Arora N (2021) Robust digital watermarking techniques for copyright protection of digital data: a survey. Wireless Pers Commun 118(4):3225\u20133249. https:\/\/doi.org\/10.1007\/s11277-021-08177-w","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"18514_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.irbm.2020.02.005","volume":"42","author":"T Janani","year":"2021","unstructured":"Janani T, Darak Y, Brindha M (2021) Secure similar image search and copyright protection over encrypted medical image databases. IRBM 42(2):83\u201393. https:\/\/doi.org\/10.1016\/j.irbm.2020.02.005","journal-title":"IRBM"},{"issue":"1","key":"18514_CR12","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/MNET.011.2000263","volume":"35","author":"Y Li","year":"2020","unstructured":"Li Y, Chen C, Liu N, Huang H, Zheng Z, Yan Q (2020) A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35(1):234\u2013241. https:\/\/doi.org\/10.1109\/MNET.011.2000263","journal-title":"IEEE Network"},{"key":"18514_CR13","doi-asserted-by":"publisher","first-page":"45468","DOI":"10.1109\/ACCESS.2020.2976894","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Li T, Pei X, Wen L, Wang C (2020) Medical data sharing scheme based on attribute cryptosystem and blockchain technology. IEEE Access 8:45468\u201345476. https:\/\/doi.org\/10.1109\/ACCESS.2020.2976894","journal-title":"IEEE Access"},{"issue":"3","key":"18514_CR14","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1016\/j.aej.2020.02.020","volume":"59","author":"HER Hassan","year":"2020","unstructured":"Hassan HER, Tahoun M, ElTaweel GS (2020) A robust computational DRM framework for protecting multimedia contents using AES and ECC. Alex Eng J 59(3):1275\u20131286. https:\/\/doi.org\/10.1016\/j.aej.2020.02.020","journal-title":"Alex Eng J"},{"key":"18514_CR15","doi-asserted-by":"publisher","unstructured":"Mehraj S, Banday MT (2020) Establishing a zero trust strategy in cloud computing environment. 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 1\u20136. https:\/\/doi.org\/10.1109\/ICCCI48352.2020.9104214","DOI":"10.1109\/ICCCI48352.2020.9104214"},{"key":"18514_CR16","doi-asserted-by":"publisher","unstructured":"Samaniego M, Deters R (2018) Zero-trust hierarchical management in IoT. 2018 IEEE international congress on Internet of Things (ICIOT). IEEE, 88\u201395. https:\/\/doi.org\/10.1109\/ICIOT.2018.00019","DOI":"10.1109\/ICIOT.2018.00019"},{"key":"18514_CR17","doi-asserted-by":"publisher","unstructured":"Shen J (2021) Blockchain technology and its applications in digital content copyright protection. Proceedings of the 4th International Conference on Economic Management and Green Development. Springer, 18\u201325. https:\/\/doi.org\/10.1007\/978-981-16-5359-9_3","DOI":"10.1007\/978-981-16-5359-9_3"},{"issue":"16","key":"18514_CR18","doi-asserted-by":"publisher","first-page":"15138","DOI":"10.1109\/JIOT.2022.3147925","volume":"9","author":"T Li","year":"2022","unstructured":"Li T, Wang H, He D, Yu J (2022) Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J 9(16):15138\u201315149. https:\/\/doi.org\/10.1109\/JIOT.2022.3147925","journal-title":"IEEE Internet Things J"},{"key":"18514_CR19","doi-asserted-by":"publisher","first-page":"108029","DOI":"10.1016\/j.comnet.2021.108029","volume":"191","author":"Y Hei","year":"2021","unstructured":"Hei Y, Liu J, Feng H, Li D, Liu Y, Wu Q (2021) Making MA-ABE fully accountable: a blockchain-based approach for secure digital right management. Comput Netw 191:108029. https:\/\/doi.org\/10.1016\/j.comnet.2021.108029","journal-title":"Comput Netw"},{"issue":"4","key":"18514_CR20","doi-asserted-by":"publisher","first-page":"5233","DOI":"10.1109\/JSYST.2021.3064356","volume":"15","author":"J Gao","year":"2021","unstructured":"Gao J, Yu H, Zhu X, Li X (2021) Blockchain-based digital rights management scheme via multiauthority ciphertext-policy attribute-based encryption and proxy re-encryption. IEEE Syst J 15(4):5233\u20135244. https:\/\/doi.org\/10.1109\/JSYST.2021.3064356","journal-title":"IEEE Syst J"},{"issue":"3","key":"18514_CR21","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1504\/IJAHUC.2021.113863","volume":"36","author":"S Rana","year":"2021","unstructured":"Rana S, Mishra D (2021) Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems. Int J Ad Hoc Ubiquitous Comput 36(3):131\u2013140. https:\/\/doi.org\/10.1504\/IJAHUC.2021.113863","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"key":"18514_CR22","doi-asserted-by":"publisher","unstructured":"Mishra D, Kasi A, Obaidat M S, Rewal P, Mishra A (2021) Construction of Lightweight Content key Distribution Framework for DRM systems. 2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA). IEEE, 863\u2013868. https:\/\/doi.org\/10.1109\/ICCCA52192.2021.9666245","DOI":"10.1109\/ICCCA52192.2021.9666245"},{"key":"18514_CR23","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/bs.adcom.2021.01.003","volume":"123","author":"X Li","year":"2021","unstructured":"Li X, Darwich M, Salehi MA, Bayoumi M (2021) A survey on cloud-based video streaming services. Adv Comput 123:193\u2013244. https:\/\/doi.org\/10.1016\/bs.adcom.2021.01.003","journal-title":"Adv Comput"},{"key":"18514_CR24","doi-asserted-by":"publisher","unstructured":"Liu L, Shang W, Lin W, Huang W (2021) A decentralized copyright protection, transaction and content distribution system based on blockchain 3.0. 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD-Winter). IEEE, 45\u201350. https:\/\/doi.org\/10.1109\/SNPDWinter52325.2021.00018","DOI":"10.1109\/SNPDWinter52325.2021.00018"},{"key":"18514_CR25","doi-asserted-by":"publisher","unstructured":"Mehta R, Kapoor N, Sourav S, Shorey R (2019) Decentralised image sharing and copyright protection using blockchain and perceptual hashes. 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 1\u20136. https:\/\/doi.org\/10.1109\/COMSNETS.2019.8711440","DOI":"10.1109\/COMSNETS.2019.8711440"},{"issue":"15","key":"18514_CR26","doi-asserted-by":"publisher","first-page":"9735","DOI":"10.1007\/s11042-019-08059-1","volume":"79","author":"J Guo","year":"2020","unstructured":"Guo J, Li C, Zhang G, Sun Y, Bie R (2020) Blockchain-enabled digital rights management for multimedia resources of online education. Multimed Tools Appl 79(15):9735\u20139755. https:\/\/doi.org\/10.1007\/s11042-019-08059-1","journal-title":"Multimed Tools Appl"},{"key":"18514_CR27","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jpdc.2021.02.022","volume":"152","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R, Marchang N, Srivastava G, Gadekallu TR, Xiong NN (2021) A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J Parallel Distrib Comput 152:128\u2013143. https:\/\/doi.org\/10.1016\/j.jpdc.2021.02.022","journal-title":"J Parallel Distrib Comput"},{"key":"18514_CR28","doi-asserted-by":"publisher","first-page":"e709","DOI":"10.7717\/peerj-cs.709","volume":"7","author":"Y Liu","year":"2021","unstructured":"Liu Y, Zhang J, Wu S, Pathan MS (2021) Research on digital copyright protection based on the hyperledger fabric blockchain network technology. PeerJ Comput Sci 7:e709. https:\/\/doi.org\/10.7717\/peerj-cs.709","journal-title":"PeerJ Comput Sci"},{"key":"18514_CR29","doi-asserted-by":"publisher","unstructured":"Wang Z, Li T (2021) Research on Image copyright confirmation and protection model based on blockchain. 2021 2nd International Conference on Control, Robotics and Intelligent System. ACM, 230\u2013234. https:\/\/doi.org\/10.1145\/3483845.3483886","DOI":"10.1145\/3483845.3483886"},{"issue":"4","key":"18514_CR30","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1109\/TNSE.2022.3157867","volume":"9","author":"BW Wang","year":"2022","unstructured":"Wang BW, Shi JW, Wang WS, Zhao P (2022) Image copyright protection based on blockchain and zero-watermark. IEEE Trans Netw Sci Eng 9(4):2188\u20132199. https:\/\/doi.org\/10.1109\/TNSE.2022.3157867","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"17","key":"18514_CR31","doi-asserted-by":"publisher","first-page":"24721","DOI":"10.1007\/s11042-022-12617-5","volume":"81","author":"D Brabin","year":"2022","unstructured":"Brabin D, Ananth C, Bojjagani S (2022) Blockchain based security framework for sharing digital images using reversible data hiding and encryption. Multimed Tools Appl 81(17):24721\u201324738. https:\/\/doi.org\/10.1007\/s11042-022-12617-5","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"18514_CR32","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1109\/JIOT.2020.3032896","volume":"8","author":"CW Lin","year":"2021","unstructured":"Lin CW, Srivastava G, Zhang YY, Djenouri Y, Aloqaily M (2021) Privacy-preserving multiobjective sanitization model in 6G IoT environments. IEEE Internet Things J 8(7):5340\u20135349. https:\/\/doi.org\/10.1109\/JIOT.2020.3032896","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"18514_CR33","doi-asserted-by":"publisher","first-page":"4685","DOI":"10.1007\/s12652-022-04372-0","volume":"14","author":"K Prokop","year":"2023","unstructured":"Prokop K, Po\u0142ap D, Srivastava G, Lin CW (2023) Blockchain-based federated learning with checksums to increase security in internet of things solutions. J Ambient Intell Humaniz Comput 14(5):4685\u20134694. https:\/\/doi.org\/10.1007\/s12652-022-04372-0","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"18514_CR34","doi-asserted-by":"publisher","unstructured":"Gai K, She Y, Zhu L, Choo K R, Wan Z (2022) A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM Trans Internet Technol (TOIT): 1\u201324. https:\/\/doi.org\/10.1145\/3511899","DOI":"10.1145\/3511899"},{"issue":"3","key":"18514_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3511902","volume":"23","author":"J Wang","year":"2022","unstructured":"Wang J, Chen JH, Xiong N, Alfarraj O, Tolba A, Ren YJ (2022) S-BDS: an effective blockchain-based data storage scheme in zero-trust IoT. ACM Trans Internet Technol 23(3):1\u201323. https:\/\/doi.org\/10.1145\/3511902","journal-title":"ACM Trans Internet Technol"},{"issue":"4","key":"18514_CR36","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1109\/TCDS.2021.3135948","volume":"14","author":"X Jin","year":"2021","unstructured":"Jin X, Jing PG, Wu JS, Xu J, Su YT (2021) Visual sentiment classification via low-rank regularization and label relaxation. IEEE Trans Cognit Dev Syst 14(4):1678\u20131690","journal-title":"IEEE Trans Cognit Dev Syst"},{"key":"18514_CR37","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.neucom.2022.04.015","volume":"491","author":"X Jin","year":"2021","unstructured":"Jin X, Guo CL, He Z, Xu J, Wang YW, Su YT (2021) FCMNet: frequency-aware cross-modality attention networks for RGB-D salient object detection. Neurocomputing 491:417\u2013425. https:\/\/doi.org\/10.1016\/j.neucom.2022.04.015","journal-title":"Neurocomputing"},{"issue":"11","key":"18514_CR38","doi-asserted-by":"publisher","first-page":"7632","DOI":"10.1109\/TCSVT.2022.3180274","volume":"32","author":"X Jin","year":"2022","unstructured":"Jin X, Yi K, Xu J (2022) MoADNet: mobile asymmetric dual-stream networks for real-time and lightweight RGB-D salient object detection. IEEE Trans Circuits Syst Video Technol 32(11):7632\u20137645. https:\/\/doi.org\/10.1109\/TCSVT.2022.3180274","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"18514_CR39","doi-asserted-by":"publisher","first-page":"35733","DOI":"10.1007\/s11042-021-11126-1","volume":"81","author":"X Jin","year":"2021","unstructured":"Jin X, He Z, Wang YW, Yu JW, Xu J (2021) Towards general object-based video forgery detection via dual-stream networks and depth information embedding. Multimed Tools Appl 81:35733\u201335749. https:\/\/doi.org\/10.1007\/s11042-021-11126-1","journal-title":"Multimed Tools Appl"},{"key":"18514_CR40","doi-asserted-by":"publisher","first-page":"40993","DOI":"10.1007\/s11042-022-13001-z","volume":"81","author":"X Jin","year":"2022","unstructured":"Jin X, He Z, Xu J, Wang YW, Su YT (2022) Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning. Multimed Tools Appl 81:40993\u201341011. https:\/\/doi.org\/10.1007\/s11042-022-13001-z","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18514-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18514-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18514-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:20:19Z","timestamp":1725423619000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18514-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,24]]},"references-count":40,"journal-issue":{"issue":"32","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["18514"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18514-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,24]]},"assertion":[{"value":"15 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}