{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:37:49Z","timestamp":1774690669642,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2020YFB1005700"],"award-info":[{"award-number":["2020YFB1005700"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2021YFA1000600"],"award-info":[{"award-number":["2021YFA1000600"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development (R &D) Program, Young Scientist Scheme","award":["2022YFB3102400"],"award-info":[{"award-number":["2022YFB3102400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132018"],"award-info":[{"award-number":["62132018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172117"],"award-info":[{"award-number":["62172117"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of Guangdong Province","award":["2020B0101090002"],"award-info":[{"award-number":["2020B0101090002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s12652-023-04577-x","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T17:03:00Z","timestamp":1679936580000},"page":"7663-7678","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["B2IPTS: A blockchain-based intellectual property transaction framework"],"prefix":"10.1007","volume":"14","author":[{"given":"Shan","family":"Ai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4165-3545","authenticated-orcid":false,"given":"Chang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yanli","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,27]]},"reference":[{"issue":"1","key":"4577_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCI.2018.2794065","volume":"4","author":"B Ahmaderaghi","year":"2018","unstructured":"Ahmaderaghi B, Kurugollu F, Rincon JM Del, Bouridane A (2018) Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Trans Comput Imaging 4(1):46\u201359","journal-title":"IEEE Trans Comput Imaging"},{"key":"4577_CR2","doi-asserted-by":"crossref","unstructured":"Chamoso P, Rivas A, Mart\u00edn-Limorti JJ, Rodr\u00edguez S (2017) A hash based image matching algorithm for social networks. In International conference on practical applications of agents and multi-agent systems. Springer 183\u2013190","DOI":"10.1007\/978-3-319-61578-3_18"},{"key":"4577_CR3","volume-title":"Intellectual Property: Patents, Copyright, Trade Marks and Allied Rights","author":"W Cornish","year":"2003","unstructured":"Cornish W, Llewelyn D, Aplin T (2003) Intellectual Property: Patents, Copyright, Trade Marks and Allied Rights. London: Sweet & Maxwell, London"},{"key":"4577_CR4","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"L Daming","year":"2019","unstructured":"Daming L, Lianbing D, Bhooshan GB, Haoxiang W, Chang C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inform Sci 479:432\u2013447","journal-title":"Inform Sci"},{"key":"4577_CR5","doi-asserted-by":"crossref","unstructured":"Dan B, Craig G, Ben L, Hovav S (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques. Springer 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"4577_CR6","doi-asserted-by":"crossref","unstructured":"Deshpande A, Herlihy M (2020) Privacy-preserving cross-chain atomic swaps. In International Conference on Financial Cryptography and Data Security. Springer 540\u2013549","DOI":"10.1007\/978-3-030-54455-3_38"},{"key":"4577_CR7","unstructured":"Envato (2021) Registering your music with youtube content id. Available at: https:\/\/help.elements.envato.com\/hc\/en-us\/articles\/360016435492-Guide-to-YouTube-Content-ID-Copyright-Notices. Accessed 18 Mar 2023"},{"key":"4577_CR8","first-page":"451","volume":"1","author":"A Erwig","year":"2021","unstructured":"Erwig A, Faust S, Host\u00e1kov\u00e1 K, Maitra M, Riahi S (2021) Two-party adaptor signatures from identification schemes. Public Key Cryptogr 1:451\u2013480","journal-title":"Public Key Cryptogr"},{"key":"4577_CR9","unstructured":"Ethereum (2020) https:\/\/github.com\/ethereum\/consensus-specs\/blob\/dev\/specs\/phase0\/beacon-chain.md#bls-signatures. Accessed 30 Aug 2021. [EB\/OL]"},{"key":"4577_CR10","unstructured":"Giulio M, Pedro M-S, Clara S, Aniket K, Matteo M ( 2019) Anonymous multi-hop locks for blockchain scalability and interoperability. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019"},{"issue":"4","key":"4577_CR11","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1016\/j.clsr.2018.05.027","volume":"34","author":"G G\u00fcrkaynak","year":"2018","unstructured":"G\u00fcrkaynak G, Y\u0131lmaz I, Ye\u015filaltay B, Bengi B (2018) Intellectual property law and practice in the blockchain realm. Comput Law Secur Rev 34(4):847\u2013862","journal-title":"Comput Law Secur Rev"},{"key":"4577_CR12","doi-asserted-by":"crossref","unstructured":"Halloush Zain\u00a0A, Yaseen Qussai\u00a0M (2019) A blockchain model for preserving intellectual property. In Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems 1\u20135","DOI":"10.1145\/3368691.3368744"},{"key":"4577_CR13","doi-asserted-by":"crossref","unstructured":"Hao Q, Luo L, Jan Steve\u00a0TK, Wang G (2021) It\u2019s not what it looks like: Manipulating perceptual hashing based applications. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 69\u201385","DOI":"10.1145\/3460120.3484559"},{"key":"4577_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116019","volume":"90","author":"W Hatoum Makram","year":"2021","unstructured":"Hatoum Makram W, Jean-Fran\u00e7ois C, Raphael C, Rony D (2021) Using deep learning for image watermarking attack. Signal Process Image Commun 90:116019","journal-title":"Signal Process Image Commun"},{"key":"4577_CR15","doi-asserted-by":"crossref","unstructured":"Ito K, O\u2019Dair M (2019) A critical examination of the application of blockchain technology to intellectual property management. 317\u2013335","DOI":"10.1007\/978-3-319-99058-3_12"},{"key":"4577_CR16","doi-asserted-by":"crossref","unstructured":"Jnoub N, Klas W (2019) Detection of tampered images using blockchain technology. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 70\u201373. IEEE","DOI":"10.1109\/BLOC.2019.8751300"},{"issue":"1","key":"4577_CR17","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36\u201363","journal-title":"Int J Inf Secur"},{"key":"4577_CR18","doi-asserted-by":"crossref","unstructured":"Kahng Andrew\u00a0B, Lach J, Mangione-Smith William\u00a0H, Mantik S, Markov Igor\u00a0L, Potkonjak M, Tucker P, Wang H, Wolfe G (1998) Watermarking techniques for intellectual property protection. In Proceedings of the 35th annual Design Automation Conference 776\u2013781","DOI":"10.1145\/277044.277240"},{"key":"4577_CR19","doi-asserted-by":"crossref","unstructured":"Lee E, Yoon Y (2019) Trusted information project platform based on blockchain for sharing strategy. Journal of Ambient Intelligence and Humanized Computing 1\u201311","DOI":"10.1007\/s12652-019-01421-z"},{"issue":"7","key":"4577_CR20","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TITS.2017.2777990","volume":"19","author":"L Li","year":"2018","unstructured":"Li L, Liu J, Cheng L, Qiu S, Wang W, Zhang X, Zhang Z (2018) Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans Intell Transp Syst 19(7):2204\u20132220","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"7","key":"4577_CR21","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1002\/int.22428","volume":"36","author":"T Li","year":"2021","unstructured":"Li T, Wang Z, Yang G, Cui Y, Chen Y, Xiaomei Y (2021) Semi-selfish mining based on hidden Markova decision process. Int J Intell Syst 36(7):3596\u20133612","journal-title":"Int J Intell Syst"},{"key":"4577_CR22","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2021.07.051","volume":"461","author":"Y Li","year":"2021","unstructured":"Li Y, Wang H, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171\u2013193","journal-title":"Neurocomputing"},{"key":"4577_CR23","unstructured":"Masoumeh S, Nils L, Jiaqi W, Xinda L, Florian K (2021) On the robustness of backdoor-based watermarking in deep neural networks. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security 177\u2013188"},{"key":"4577_CR24","unstructured":"Maurice H (2018) Atomic cross-chain swaps. In Proceedings of the 2018 ACM symposium on principles of distributed computing 245\u2013254"},{"key":"4577_CR25","unstructured":"Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Available at: https:\/\/assets.pubpub.org\/d8wct41f\/31611263538139.pdf. Accessed 18 Mar 2023"},{"key":"4577_CR27","unstructured":"Poon J, Dryja T (2016) The bitcoin lightning network: scalable off-chain instant payments. Available at: https:\/\/static1.squarespace.com\/static\/6148a75532281820459770d1\/t\/61af971f7ee2b432f1733aee\/1638897446181\/lightning-network-paper.pdf. Accessed 18 Mar 2023"},{"key":"4577_CR28","doi-asserted-by":"crossref","unstructured":"Putz B, Pernul G (2020) Detecting blockchain security threats. In 2020 IEEE International Conference on Blockchain (Blockchain) 313\u2013320. IEEE","DOI":"10.1109\/Blockchain50366.2020.00046"},{"key":"4577_CR29","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-030-47436-2_35","volume":"12085","author":"Z Qi","year":"2020","unstructured":"Qi Z, Zhang Leo Y, Jun Z, Longxiang G, Yong X (2020) Protecting IP of deep neural networks with watermarking: a new label helps. Adv Knowl Discov Data Min 12085:462","journal-title":"Adv Knowl Discov Data Min"},{"issue":"2019","key":"4577_CR30","first-page":"129","volume":"2","author":"S Rai","year":"2019","unstructured":"Rai S, Boghey R, Shahane D, Saxena P (2019) Digital image watermarking against geometrical attack. Data, Eng Appl 2(2019):129\u2013145","journal-title":"Data, Eng Appl"},{"issue":"7","key":"4577_CR31","doi-asserted-by":"publisher","first-page":"7121","DOI":"10.1007\/s12652-020-02379-z","volume":"12","author":"R Ramasamy","year":"2021","unstructured":"Ramasamy R, Arumugam V (2021) Robust image watermarking using fractional Krawtchouk transform with optimization. J Ambient Intell Humaniz Comput 12(7):7121\u20137132","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"4577_CR32","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1049\/cit2.12029","volume":"6","author":"F Regazzoni","year":"2021","unstructured":"Regazzoni F, Palmieri P, Smailbegovic F, Cammarota R, Polian I (2021) Protecting artificial intelligence IPS: a survey of watermarking and fingerprinting for machine learning. CAAI Trans Intell Technol 6(2):180\u2013191","journal-title":"CAAI Trans Intell Technol"},{"key":"4577_CR33","unstructured":"Rhodes EP (2021) Cryptopunks and copyrights: What\u2019s all the fuss about?. Available at: https:\/\/www.theouterrealm.io\/blog\/cryptopunks-copyrights. Accessed 18 Mar 2023"},{"issue":"3","key":"4577_CR34","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr C-P (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161\u2013174","journal-title":"J Cryptol"},{"key":"4577_CR35","unstructured":"Shawdagor J (2022) Two nft apers fight over which iteration is the real fake version of bayc. Available at: https:\/\/www.banklesstimes.com\/news\/2021\/12\/31\/two-nft-apers-fight-over-which-iteration-is-the-real-fake-version-of-bayc\/. Accessed 18 Mar 2023"},{"issue":"3","key":"4577_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102507","volume":"58","author":"H Song","year":"2021","unstructured":"Song H, Zhu N, Xue R, He J, Zhang K, Wang J (2021) Proof-of-contribution consensus mechanism for blockchain and its application in intellectual property protection. Inform Process Manag 58(3):102507","journal-title":"Inform Process Manag"},{"key":"4577_CR37","unstructured":"Sri AKT, Giulio M (2021) Lockable signatures for blockchains: scriptless scripts for all signatures. In 2021 IEEE Symposium on Security and Privacy (SP)937\u2013954. IEEE"},{"key":"4577_CR38","unstructured":"Tevora Threat Research Group TTRG (2021) 2021 hyperledger fabric penetration test, Linux Foundation 2021 HyperLedger Fabric Penetration Test. Available at: https:\/\/wiki.hyperledger.org\/download\/attachments\/13861997\/2021%20HyperLedger%20Fabric%20Penetration%20Test%20v0.1.pdf?api=v2a. Accessed 18 Mar 2023"},{"issue":"5","key":"4577_CR39","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1007\/s12652-019-01295-1","volume":"11","author":"M Thanki Rohit","year":"2020","unstructured":"Thanki Rohit M, Kothari Ashish M (2020) Hybrid domain watermarking technique for copyright protection of images using speech watermarks. J Ambient Intell Humaniz Comput 11(5):1835\u20131857","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4577_CR40","doi-asserted-by":"crossref","unstructured":"Tsai W-T, Feng L, Zhang H, You Y, Wang L, Zhong Y (2017) Intellectual-property blockchain-based protection model for microfilms. In 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE)174\u2013178. IEEE","DOI":"10.1109\/SOSE.2017.35"},{"key":"4577_CR41","doi-asserted-by":"crossref","unstructured":"Uchida Y, Nagai Y, Sakazawa S, Satoh S (2017) Embedding watermarks into deep neural networks. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval 269\u2013277","DOI":"10.1145\/3078971.3078974"},{"key":"4577_CR42","doi-asserted-by":"crossref","unstructured":"Vadrevu P, Perdisci R (2019) What you see is not what you get: discovering and tracking social engineering attack campaigns. In Proceedings of the Internet Measurement Conference308\u2013321","DOI":"10.1145\/3355369.3355600"},{"issue":"2","key":"4577_CR43","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2020","unstructured":"Wang W, Song J, Xu G, Li Y, Wang Ca, Andwa\u00a0SH (2020) Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133\u20131144","journal-title":"Trans Netw Sci Eng"},{"key":"4577_CR44","doi-asserted-by":"publisher","first-page":"49532","DOI":"10.1109\/ACCESS.2020.2969990","volume":"8","author":"L Xiao","year":"2020","unstructured":"Xiao L, Huang W, Xie Y, Xiao W, Li K-C (2020) A blockchain-based traceable IP copyright protection algorithm. IEEE Access 8:49532\u201349542","journal-title":"IEEE Access"},{"issue":"11","key":"4577_CR45","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1002\/int.22270","volume":"35","author":"G Yang","year":"2020","unstructured":"Yang G, Wang Y, Wang Z, Tian Y, Xiaomei Y, Li S (2020) IPBSM: an optimal bribery selfish mining in the presence of intelligent and pure attackers. Int J Intell Syst 35(11):1735\u20131748","journal-title":"Int J Intell Syst"},{"issue":"10","key":"4577_CR46","doi-asserted-by":"publisher","first-page":"10288","DOI":"10.1109\/JIOT.2020.3004273","volume":"7","author":"E Zaghloul","year":"2020","unstructured":"Zaghloul E, Li T, Mutka Matt W, Ren J (2020) Bitcoin and blockchain: security and privacy. IEEE Internet Things J 7(10):10288\u201310313","journal-title":"IEEE Internet Things J"},{"key":"4577_CR47","doi-asserted-by":"crossref","unstructured":"Zannettou S, Caulfield T, Bradlyn B, De Cristofaro E, Stringhini G, Blackburn J (2020) Characterizing the use of images in state-sponsored information warfare operations by russian trolls on twitter. In Proceedings of the International AAAI Conference on Web and Social Media 14:774\u2013785","DOI":"10.1609\/icwsm.v14i1.7342"},{"key":"4577_CR48","doi-asserted-by":"crossref","unstructured":"Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy I (2018). Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security159\u2013172","DOI":"10.1145\/3196494.3196550"},{"issue":"5","key":"4577_CR26","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/TEM.2021.3066090","volume":"70","author":"P Zhu","year":"2023","unstructured":"Zhu P, Hu J, Li X, Zhu Q (2023) Using blockchain technology to enhance the traceability of original achievements. IEEE Trans Eng Manage 70(5):1693\u20131707","journal-title":"IEEE Trans Eng Manage"},{"key":"4577_CR49","unstructured":"Zou M (2019) China\u2019s top photo agency visual china group accused of selling images of national flag, claiming copyright to black hole shot, 2019. https:\/\/www.scmp.com\/news\/china\/society\/article\/3005897\/chinas-top-photo-agency-accused-selling-images-national-flag"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04577-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-023-04577-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04577-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T18:16:54Z","timestamp":1684865814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-023-04577-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":49,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["4577"],"URL":"https:\/\/doi.org\/10.1007\/s12652-023-04577-x","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"18 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}