{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:41Z","timestamp":1775199581863,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568575","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"398-404","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4986-7599","authenticated-orcid":false,"given":"Le Danh","family":"Tai","sequence":"first","affiliation":[{"name":"LQD, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2075-6246","authenticated-orcid":false,"given":"Nguyen Van","family":"Thanh","sequence":"additional","affiliation":[{"name":"Academy of Military Science and Technology, Military Information Technology Institute, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8327-2009","authenticated-orcid":false,"given":"Ta Minh","family":"Thanh","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.12.004"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2712162"},{"key":"e_1_3_2_1_3_1","volume-title":"Example: A Developer\u2019s Guide to Creating Decentralized Applications Using Bitcoin, Ethereum, and Hyperledger","author":"Badr B.","year":"2018","unstructured":"B. Badr , R. Horrocks , and X. Wu . 2018 . Blockchain by Example: A Developer\u2019s Guide to Creating Decentralized Applications Using Bitcoin, Ethereum, and Hyperledger . Packt Publishing . https:\/\/books.google.com.vn\/books?id=PzmoswEACAAJ B. Badr, R. Horrocks, and X. Wu. 2018. Blockchain by Example: A Developer\u2019s Guide to Creating Decentralized Applications Using Bitcoin, Ethereum, and Hyperledger. Packt Publishing. https:\/\/books.google.com.vn\/books?id=PzmoswEACAAJ"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIE.2010.5735066"},{"key":"e_1_3_2_1_5_1","article-title":"Digital Image Watermarking Techniques","volume":"11","author":"Begum Mahbuba","year":"2020","unstructured":"Mahbuba Begum and Mohammad\u00a0Shorif Uddin . 2020 . Digital Image Watermarking Techniques : A Review. Information 11 , 2 (2020). https:\/\/doi.org\/10.3390\/info11020110 10.3390\/info11020110 Mahbuba Begum and Mohammad\u00a0Shorif Uddin. 2020. Digital Image Watermarking Techniques: A Review. Information 11, 2 (2020). https:\/\/doi.org\/10.3390\/info11020110","journal-title":"A Review. Information"},{"key":"#cr-split#-e_1_3_2_1_6_1.1","unstructured":"Juan Benet. 2014. IPFS - Content Addressed Versioned P2P File System. https:\/\/doi.org\/10.48550\/ARXIV.1407.3561 10.48550\/ARXIV.1407.3561"},{"key":"#cr-split#-e_1_3_2_1_6_1.2","unstructured":"Juan Benet. 2014. IPFS - Content Addressed Versioned P2P File System. https:\/\/doi.org\/10.48550\/ARXIV.1407.3561"},{"key":"e_1_3_2_1_7_1","unstructured":"cbc.ca. 2009. The pros cons and future of DRM. https:\/\/www.cbc.ca\/news\/science\/the-pros-cons-and-future-of-drm-1.785237. Accessed: 2022-07-20.  cbc.ca. 2009. The pros cons and future of DRM. https:\/\/www.cbc.ca\/news\/science\/the-pros-cons-and-future-of-drm-1.785237. Accessed: 2022-07-20."},{"key":"#cr-split#-e_1_3_2_1_8_1.1","doi-asserted-by":"crossref","unstructured":"Morris Dworkin Elaine Barker James Nechvatal James Foti Lawrence Bassham E. Roback and James Dray. 2001. Advanced Encryption Standard (AES). https:\/\/doi.org\/10.6028\/NIST.FIPS.197 10.6028\/NIST.FIPS.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"#cr-split#-e_1_3_2_1_8_1.2","doi-asserted-by":"crossref","unstructured":"Morris Dworkin Elaine Barker James Nechvatal James Foti Lawrence Bassham E. Roback and James Dray. 2001. Advanced Encryption Standard (AES). https:\/\/doi.org\/10.6028\/NIST.FIPS.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1963\/1\/012094"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.111"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.112"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINTC.2018.8363157"},{"key":"e_1_3_2_1_13_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. 1\u20139.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. 1\u20139. Available at https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. 1\u20139. Available at https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-06975-3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2016.7754123"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE51753.2021.9431809"},{"key":"e_1_3_2_1_17_1","volume-title":"Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information 12, 8","author":"Srivastava Rohit","year":"2021","unstructured":"Rohit Srivastava , Ravi Tomar , Maanak Gupta , Anuj\u00a0Kumar Yadav , and Jaehong Park . 2021. Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information 12, 8 ( 2021 ). https:\/\/doi.org\/10.3390\/info12080310 10.3390\/info12080310 Rohit Srivastava, Ravi Tomar, Maanak Gupta, Anuj\u00a0Kumar Yadav, and Jaehong Park. 2021. Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information 12, 8 (2021). https:\/\/doi.org\/10.3390\/info12080310"},{"key":"e_1_3_2_1_18_1","volume-title":"Conceptualizing Blockchains: Characteristics & Applications. ArXiv abs\/1806.03693(2018).","author":"Sultan Karimshah","year":"2018","unstructured":"Karimshah Sultan , Umar Ruhi , and Rubina Lakhani . 2018 . Conceptualizing Blockchains: Characteristics & Applications. ArXiv abs\/1806.03693(2018). Karimshah Sultan, Umar Ruhi, and Rubina Lakhani. 2018. Conceptualizing Blockchains: Characteristics & Applications. ArXiv abs\/1806.03693(2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0327-z"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-015-0472-7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2014.7136511"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005291900140025"},{"key":"e_1_3_2_1_23_1","volume-title":"Extended DCT Domain for Improving the Quality of Watermarked Image. In 2015 Seventh International Conference on Knowledge and Systems Engineering (KSE). 336\u2013339","author":"Thanh Ta\u00a0Minh","year":"2015","unstructured":"Ta\u00a0Minh Thanh and Nguyen\u00a0Trung Thanh . 2015 . Extended DCT Domain for Improving the Quality of Watermarked Image. In 2015 Seventh International Conference on Knowledge and Systems Engineering (KSE). 336\u2013339 . https:\/\/doi.org\/10.1109\/KSE.2015.70 10.1109\/KSE.2015.70 Ta\u00a0Minh Thanh and Nguyen\u00a0Trung Thanh. 2015. Extended DCT Domain for Improving the Quality of Watermarked Image. In 2015 Seventh International Conference on Knowledge and Systems Engineering (KSE). 336\u2013339. https:\/\/doi.org\/10.1109\/KSE.2015.70"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033229"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","location":"Hanoi Vietnam","acronym":"SoICT 2022"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:39Z","timestamp":1750186839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":26,"alternative-id":["10.1145\/3568562.3568575","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568575","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}