Abstract
With the advent of the digital age, the copyright protection of images is facing increasingly complex challenges, creating new problems for creators. This paper aims to address this challenge by proposing a solution based on deep learning and blockchain technology. First, we introduce an AUL plagiarism detection algorithm that demonstrates its excellent performance in various image tampering scenarios through extensive experiments. According to the experiments, the AUL algorithm outperforms traditional machine learning algorithms and other deep learning methods in terms of comprehensive performance, achieving an accuracy rate of 95.451% and a recall rate of 99.101%. In addition, we integrate blockchain technology with IPFS to utilize their advantages in information protection to provide innovative solutions for image copyright protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sela, M., Luma-Osmani, S., Memeti, A.: Plagiarism as a current phenomenon in higher education institutions in republic of North Macedonia. J. Nat. Sci. Math. UT 4(7–8), 62–71 (2019)
Roig, M.: Avoiding plagiarism, self-plagiarism, and other questionable writing practices: a guide to ethical writing. The Office of Research Integrity (ORI) (2015)
Kaliyadan, F.: Image manipulation and image plagiarism–what’s fine and what’s not. Indian J. Dermatol. Venereol. Leprol. 83, 519 (2017)
Abad-Garcia, M.F.: Plagiarism and predatory journals: a threat to scientific integrity. Anales de Pediatria (Engl. Ed.) 90(1), 57–e1 (2019)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decent. Bus. Rev. (2008)
Benet, J.: IPFS-content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561 (2014)
Du, L., Ho, A.T., Cong, R.: Perceptual hashing for image authentication: a survey. Signal Process. Image Commun. 81, 115713 (2020)
Menon, S., Jain, K.: Blockchain technology for transparency in agri-food supply chain: use cases, limitations, and future directions. IEEE Trans. Eng. Manag. 71, 106–120 (2021)
Kaur, R., Kaur, A.: Digital signature. In: 2012 International Conference on Computing Sciences, pp. 295–301. IEEE (2012)
Wagner, N.R.: Fingerprinting. In: 1983 IEEE Symposium on Security and Privacy, p. 18. IEEE (1983)
Venkatesan, R., Koon, S.-M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: Proceedings 2000 International Conference on Image Processing (Cat. No. 00CH37101), vol. 3, pp. 664–666. IEEE (2000)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol. 25 (2012)
Islam, A., Long, C., Basharat, A., Hoogs, A.: DOAGAN: dual-order attentive generative adversarial network for image copy-move forgery detection and localization. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4676–4685. IEEE (2020)
Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on computer Vision and Pattern Recognition, pp. 815–823 (2015)
Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105–6114. PMLR (2019)
Zou, X., Kong, X., Wong, W., Wang, C., Liu, Y., Cao, Y.: FashionAI: a hierarchical dataset for fashion understanding. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhan, Q., Liu, Y. (2024). Protecting Image Copyrights Based on the AUL Algorithm and Blockchain. In: Huang, DS., Chen, W., Pan, Y. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_1
Download citation
DOI: https://doi.org/10.1007/978-981-97-5603-2_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-5602-5
Online ISBN: 978-981-97-5603-2
eBook Packages: Computer ScienceComputer Science (R0)