{"id":"https://openalex.org/W4409274581","doi":"https://doi.org/10.32604/cmc.2025.061733","title":"P2V-Fabric: Privacy-Preserving Video Using Hyperledger Fabric","display_name":"P2V-Fabric: Privacy-Preserving Video Using Hyperledger Fabric","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409274581","doi":"https://doi.org/10.32604/cmc.2025.061733"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.061733","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061733","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.061733","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101754929","display_name":"Muhammad Saad","orcid":"https://orcid.org/0000-0001-9715-2649"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Muhammad Saad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5037312953","display_name":"Ki-Woong Park","orcid":"https://orcid.org/0000-0002-3377-223X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ki-Woong Park","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101754929"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8414,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90203086,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"83","issue":"2","first_page":"1881","last_page":"1900"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9345999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5748197436332703},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4799502193927765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3890305161476135},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3471488356590271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5748197436332703},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4799502193927765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3890305161476135},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3471488356590271}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.061733","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061733","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.061733","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.061733","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W3012401767","https://openalex.org/W3143460466","https://openalex.org/W3158325321","https://openalex.org/W4382294108","https://openalex.org/W4383896705","https://openalex.org/W4385360486","https://openalex.org/W4386223236","https://openalex.org/W4391475475","https://openalex.org/W4394855744","https://openalex.org/W4400417919"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,44,205],"proliferation":[1],"of":[2,4,148,156,193,217,220,229,233],"Internet":[3,219],"Things":[5,221],"(IoT)":[6,222],"devices":[7,70,223],"introduces":[8],"substantial":[9],"security":[10,91,104,216,241,262],"challenges.":[11],"Currently,":[12],"privacy":[13,22],"constitutes":[14],"a":[15,170,209,230,237],"significant":[16],"concern":[17],"for":[18,67,165,240],"individuals.":[19],"While":[20],"maintaining":[21],"within":[23,56],"these":[24],"systems":[25],"is":[26,83,117],"an":[27],"essential":[28],"characteristic,":[29],"it":[30],"often":[31],"necessitates":[32],"certain":[33],"compromises,":[34],"such":[35],"as":[36],"complexity":[37],"and":[38,79,82,87,102,114,141,169,186],"scalability,":[39],"thereby":[40],"complicating":[41],"management":[42],"efforts.":[43],"principal":[45],"challenge":[46],"lies":[47],"in":[48,119,243],"ensuring":[49],"confidentiality":[50],"while":[51,224],"simultaneously":[52],"preserving":[53],"individuals\u2019":[54],"anonymity":[55],"the":[57,96,100,109,120,123,128,146,154,157,162,183,194,215,227,244,254],"system.":[58],"To":[59],"address":[60],"this,":[61],"we":[62],"present":[63],"our":[64],"proposed":[65,75,195,206],"architecture":[66,76,196,207],"managing":[68],"IoT":[69,245],"using":[71],"blockchain":[72,81],"technology.":[73],"Our":[74,151,247],"works":[77,160],"on":[78,161,252],"off":[80],"integrated":[84],"with":[85],"dashcams":[86,101],"closed-circuit":[88],"television":[89],"(CCTV)":[90],"cameras.":[92],"In":[93],"this":[94,115],"work,":[95],"videos":[97],"recorded":[98],"by":[99,199,256],"CCTV":[103],"cameras":[105],"are":[106,179,197],"hashed":[107],"through":[108,133,188],"InterPlanetary":[110],"File":[111],"System":[112],"(IPFS)":[113],"hash":[116],"stored":[118],"blockchain.":[121],"When":[122],"accessors":[124],"want":[125],"to":[126,144,181,202,260],"access":[127],"video,":[129,168],"they":[130],"must":[131],"pass":[132],"multiple":[134],"authentications":[135],"which":[136,159,235],"include":[137,153],"web":[138],"token":[139],"authentication":[140],"verifiable":[142,176],"credentials,":[143],"mitigate":[145],"risk":[147,228],"malicious":[149],"users.":[150],"contributions":[152],"proposition":[155],"framework,":[158],"single":[163,231],"key":[164],"every":[166],"new":[167],"novel":[171],"chaincode":[172],"algorithm":[173],"that":[174,212],"incorporates":[175],"credentials.":[177],"Analyses":[178],"made":[180],"show":[182],"system\u2019s":[184],"throughput":[185],"latency":[187],"stress":[189],"testing.":[190],"Significant":[191],"advantages":[192],"shown":[198],"comparing":[200],"them":[201],"existing":[203],"schemes.":[204],"features":[208],"robust":[210],"design":[211],"significantly":[213],"enhances":[214],"blockchain-enabled":[218],"effectively":[225],"mitigating":[226],"point":[232],"failure,":[234],"provides":[236],"reliable":[238],"solution":[239],"concerns":[242],"landscape.":[246],"future":[248],"endeavors":[249],"will":[250],"focus":[251],"scaling":[253],"system":[255],"integrating":[257],"innovative":[258],"methods":[259],"enhance":[261],"measures":[263],"further.":[264]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-18T23:42:31.664661","created_date":"2025-10-10T00:00:00"}
