{"id":"https://openalex.org/W4310113612","doi":"https://doi.org/10.1145/3568562.3568575","title":"Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protection","display_name":"Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protection","publication_year":2022,"publication_date":"2022-11-29","ids":{"openalex":"https://openalex.org/W4310113612","doi":"https://doi.org/10.1145/3568562.3568575"},"language":"en","primary_location":{"id":"doi:10.1145/3568562.3568575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3568562.3568575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011303188","display_name":"Le Danh Tai","orcid":"https://orcid.org/0000-0003-4986-7599"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Le Danh Tai","raw_affiliation_strings":["LQD, Vietnam"],"raw_orcid":"https://orcid.org/0000-0003-4986-7599","affiliations":[{"raw_affiliation_string":"LQD, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102866809","display_name":"Nguyen Van Thanh","orcid":"https://orcid.org/0000-0003-2075-6246"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen Van Thanh","raw_affiliation_strings":["Academy of Military Science and Technology, Military Information Technology Institute, Vietnam"],"raw_orcid":"https://orcid.org/0000-0003-2075-6246","affiliations":[{"raw_affiliation_string":"Academy of Military Science and Technology, Military Information Technology Institute, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102962734","display_name":"Ta Minh Thanh","orcid":"https://orcid.org/0000-0001-8327-2009"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ta Minh Thanh","raw_affiliation_strings":["Le Quy Don Technical University, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0001-8327-2009","affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University, Viet Nam","institution_ids":["https://openalex.org/I131359167"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011303188"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5102,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.64837955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"398","last_page":"404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9429131746292114},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9150211811065674},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7932363748550415},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6923924088478088},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5907709002494812},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.5291034579277039},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.5209513902664185},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.5069835186004639},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.44960999488830566},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.43087896704673767},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4267146587371826},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.2500215470790863},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17546892166137695}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9429131746292114},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9150211811065674},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7932363748550415},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6923924088478088},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5907709002494812},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.5291034579277039},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.5209513902664185},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.5069835186004639},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.44960999488830566},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.43087896704673767},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4267146587371826},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.2500215470790863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17546892166137695},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3568562.3568575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3568562.3568575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W791752197","https://openalex.org/W847703817","https://openalex.org/W1588071115","https://openalex.org/W1844512392","https://openalex.org/W1978943018","https://openalex.org/W2077383048","https://openalex.org/W2087224093","https://openalex.org/W2112705469","https://openalex.org/W2248473787","https://openalex.org/W2406226617","https://openalex.org/W2545788951","https://openalex.org/W2558485666","https://openalex.org/W2563257315","https://openalex.org/W2623100815","https://openalex.org/W2803353974","https://openalex.org/W3006625877","https://openalex.org/W3169956195","https://openalex.org/W3186173110","https://openalex.org/W3187229814","https://openalex.org/W4225542251","https://openalex.org/W4238341678","https://openalex.org/W4248175462"],"related_works":["https://openalex.org/W2064193056","https://openalex.org/W2503348778","https://openalex.org/W4235338517","https://openalex.org/W1562323537","https://openalex.org/W2501026370","https://openalex.org/W2183994037","https://openalex.org/W2132585739","https://openalex.org/W3168409739","https://openalex.org/W2978164681","https://openalex.org/W2035925886"],"abstract_inverted_index":{"Digital":[0],"contents":[1,94],"have":[2],"become":[3,37],"more":[4],"popular":[5,39],"and":[6,40,58,105],"rapid":[7],"in":[8],"recent":[9],"years.":[10],"The":[11,61],"need":[12,99],"of":[13,56,71,119],"techniques":[14,25],"for":[15,28],"digital":[16,31,93,120],"content":[17],"protection":[18,74],"is":[19,64],"also":[20,36,76],"quickly":[21],"required.":[22],"Various":[23],"watermarking":[24,59],"are":[26],"proposed":[27,86],"protecting":[29],"the":[30,54,69,78,81,89,92,112,117],"contents.":[32],"Blockchain":[33],"technology":[34],"has":[35],"very":[38],"applied":[41],"on":[42,53],"many":[43],"solutions.":[44],"This":[45],"paper":[46],"proposes":[47],"a":[48],"new":[49],"hybrid":[50],"model":[51],"based":[52],"combination":[55],"blockchain":[57,82,90],"method.":[60],"main":[62],"purpose":[63,118],"not":[65,98],"only":[66],"to":[67,103],"achieve":[68],"goal":[70],"image":[72,79],"copyright":[73,121],"but":[75],"store":[77],"into":[80],"network.":[83],"Since":[84],"our":[85,113],"method":[87,114],"employs":[88],"mechanism,":[91],"authentication":[95],"algorithm":[96],"does":[97],"any":[100],"third":[101],"party":[102],"join":[104],"confirm.":[106],"Our":[107],"experimental":[108],"results":[109],"show":[110],"that":[111],"successfully":[115],"achieved":[116],"protection.":[122]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
