Embedded Blockchains: A Synthesis of Blockchains, Spread Spectrum Watermarking, Perceptual Hashing Digital Signatures

09/02/2020
by   Sam Blake, et al.
0

In this paper we introduce a scheme for detecting manipulated audio and video. The scheme is a synthesis of blockchains, encrypted spread spectrum watermarks, perceptual hashing and digital signatures, which we call an Embedded Blockchain. Within this scheme, we use the blockchain for its data structure of a cryptographically linked list, cryptographic hashing for absolute comparisons, perceptual hashing for flexible comparisons, digital signatures for proof of ownership, and encrypted spread spectrum watermarking to embed the blockchain into the background noise of the media. So each media recording has its own unique blockchain, with each block holding information describing the media segment. The problem of verifying the integrity of the media is recast to traversing the blockchain, block-by-block, and segment-by-segment of the media. If any chain is broken, the difference in the computed and extracted perceptual hash is used to estimate the level of manipulation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/20/2018

Is Blockchain Hashing an Effective Method for Electronic Governance?

Governments across the world are testing different uses of the blockchai...
research
01/29/2020

RSA and redactable blockchains

A blockchain is redactable if a private key holder (e.g. a central autho...
research
03/03/2021

Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective

Since the advent of bitcoin in 2008, the concept of a blockchain has wid...
research
04/15/2020

A Practical Blockchain Framework using Image Hashing for Image Authentication

Blockchain is a relatively new technology that can be seen as a decentra...
research
07/26/2023

Harnessing Web3 on Carbon Offset Market for Sustainability: Framework and A Case Study

Blockchain, pivotal in shaping the metaverse and Web3, often draws criti...
research
09/17/2019

Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography

An ideal signature material and method, which can be used to prove the a...
research
02/28/2023

A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Typically, metadata of images are stored in a specific data segment of t...

Please sign up or login with your details

Forgot password? Click here to reset