{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:47:23Z","timestamp":1762033643635,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:00:00Z","timestamp":1562889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Nos. 61872181","Nos. 61702236"],"award-info":[{"award-number":["Nos. 61872181","Nos. 61702236"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the development of information technology, films, music, and other publications are inclined to be distributed in digitalized form. However, the low cost of data replication and dissemination leads to digital rights problems and brings huge economic losses. Up to now, existing digital rights management (DRM) schemes have been powerless to deter attempts of infringing digital rights and recover losses of copyright holders. This paper presents a YODA-based digital watermark management system (Y-DWMS), adopting non-repudiation of smart contract and blockchain, to implement a DRM mechanism to infinitely amplify the cost of infringement and recover losses copyright holders suffered once the infringement is reported. We adopt game analysis to prove that in Y-DWMS, the decision of non-infringement always dominates rational users, so as to fundamentally eradicate the infringement of digital rights, which current mainstream DRM schemes cannot reach.<\/jats:p>","DOI":"10.3390\/s19143091","type":"journal-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T11:49:38Z","timestamp":1562932178000},"page":"3091","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Y-DWMS: A Digital Watermark Management System Based on Smart Contracts"],"prefix":"10.3390","volume":"19","author":[{"given":"Bo","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, NO. 29 Yudao Street, Nanjing 210016, China"}]},{"given":"Liming","family":"Fang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, NO. 29 Yudao Street, Nanjing 210016, China"},{"name":"Key Laboratory of Computer Network Technology of Jiangsu Province, Nanjing 210096, China"}]},{"given":"Hanyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, NO. 29 Yudao Street, Nanjing 210016, China"}]},{"given":"Chunpeng","family":"Ge","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, NO. 29 Yudao Street, Nanjing 210016, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Kongens Lyngby, Capital Region, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4903-2666","authenticated-orcid":false,"given":"Liang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, NO. 29 Yudao Street, Nanjing 210016, China"}]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[{"name":"Division of Computer Science, University of Aizu, Aizuwakamatsu 965-8580, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Safavi-Naini, R., and Yung, M. (2006). Digital Rights Management: Technologies, Issues, Challenges and Systems, Springer.","DOI":"10.1007\/11787952"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1111\/deci.12120","article-title":"Optimal Digital Rights Management with Uncertain Piracy","volume":"46","author":"Sun","year":"2015","journal-title":"Decis. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","article-title":"Revocation and Tracing Schemes for Stateless Receivers","volume":"Volume 2139","author":"Naor","year":"2001","journal-title":"Proceedings of the CRYPTO 2001: Advances in Cryptology, Annual International Cryptology Conference"},{"key":"ref_4","first-page":"842","article-title":"A novel JFD scheme for DRM systems based on DWT and collusion resistance fingerprint encoding","volume":"13","author":"Mohamed","year":"2016","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref_5","first-page":"27","article-title":"Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme","volume":"19","author":"Abdalla","year":"2017","journal-title":"Int. J. Netw. Secur."},{"key":"ref_6","unstructured":"Tirkel, A.Z., Rankin, G.A., Van Schyndel, R.M., Ho, W.J., Mee, N.R., and Osborne, C.F. (1993, January 8\u201310). Electronic Watermarking. Proceedings of the DICTA 1993, Sydney, Australia."},{"key":"ref_7","unstructured":"Hartung, F., and Girod, B. (1997, January 26\u201329). Fast public-key watermarking of compressed video. Proceedings of the International Conference on Image Processing, Santa Barbara, CA, USA."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/83.951543","article-title":"Secret and public key image watermarking schemes for image authentication and ownership verification","volume":"10","author":"Wong","year":"2001","journal-title":"IEEE Trans. Image Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimed."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1186\/s13640-018-0307-5","article-title":"Secure and efficient DRM watermark algorithm of forensics in mobile internet","volume":"2018","author":"Ma","year":"2018","journal-title":"EURASIP J. Image Video Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"64955","DOI":"10.1109\/ACCESS.2019.2916674","article-title":"Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis","volume":"7","author":"Khadam","year":"2019","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.dsp.2019.01.006","article-title":"Frame-synchronized blind speech watermarking via improved adaptive mean modulation and perceptual-based additive modulation in DWT domain","volume":"87","author":"Hu","year":"2019","journal-title":"Digit. Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","article-title":"Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption","volume":"6","author":"Loan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"71699","DOI":"10.1109\/ACCESS.2018.2882405","article-title":"Exploring the Cross-Correlation as a Means for Detecting Digital Watermarks and Its Reformulation into the Fractional Calculus Framework","volume":"6","author":"Camacho","year":"2018","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1186\/s13640-018-0327-1","article-title":"A new blockchain-based trusted DRM scheme for built-in content protection","volume":"2018","author":"Ma","year":"2018","journal-title":"EURASIP J. Image Video Process."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Meng, Z., Morizumi, T., Miyata, S., and Kinoshita, H. (2018, January 23\u201327). Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain. Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan.","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Barbareschi, M., Cilardo, A., and Mazzeo, A. (2016, January 16\u201319). Partial FPGA bitstream encryption enabling hardware DRM in mobile environments. Proceedings of the ACM International Conference on Computing Frontiers, Como, Italy.","DOI":"10.1145\/2903150.2911711"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yang, Z., Fan, K., and Lai, Y. (2009, January 18\u201320). Trusted Computing Based Mobile DRM Authentication Scheme. Proceedings of the 2009 5th International Conference on Information Assurance and Security, Xi\u2019an, China.","DOI":"10.1109\/IAS.2009.303"},{"key":"ref_19","first-page":"19","article-title":"An improved E-DRM scheme for mobile environments","volume":"39","author":"Lee","year":"2018","journal-title":"J. Inf. Sec. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"65439","DOI":"10.1109\/ACCESS.2018.2876971","article-title":"Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts","volume":"6","author":"Hasan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_21","unstructured":"IPFS (2019, May 25). IPFS Source Code in Github. Available online: https:\/\/github.com\/ipfs."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Das, S., Ribeiro, V.J., and Anand, A. (2019). YODA: Enabling Computationally Intensive Contracts on Blockchains with Byzantine and Selfish Nodes, NDSS The Internet Society.","DOI":"10.14722\/ndss.2019.23142"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Al-Bassam, M., Sonnino, A., Bano, S., Hrycyszyn, D., and Danezis, G. (2018). Chainspace: A Sharded Smart Contracts Platform, NDSS The Internet Society.","DOI":"10.14722\/ndss.2018.23241"},{"key":"ref_24","unstructured":"Dong, C., Wang, Y., Aldweesh, A., McCorry, P., and van Moorsel, A. (November, January 30). Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. Proceedings of the ACM Conference on Computer and Communications Security, Dallas, TX, USA."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Mense, A., and Flatscher, M. (2018, January 19\u201321). Security Vulnerabilities in Ethereum Smart Contracts. Proceedings of the 20th International Conference on Information Integration and Web-Based Applications & Services, IIWAS 2018, Yogyakarta, Indonesia.","DOI":"10.1145\/3282373.3282419"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/14\/3091\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:05:12Z","timestamp":1760187912000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/14\/3091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,12]]},"references-count":25,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2019,7]]}},"alternative-id":["s19143091"],"URL":"https:\/\/doi.org\/10.3390\/s19143091","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,7,12]]}}}