A new blockchain-based trusted DRM scheme for built-in content protection

With the development of Internet technology, transmitting, editing and misusing the digital multimedia bring great challenges in misusing detection for multimedia content protection. In this paper we proposed an artwork image digital rights management scheme for Internet misusing detection based on watermark and blockchain with robustness and high-level security. We embed artwork right information such as author, RightHolder, Date and Location information into the artwork image data. In the scheme, we use image Arnold transform to enhance the security and use image DCT coefficients of middle frequency to embed watermark for robustness. In the transparence of watermark, HVS and Watson models are used to control the watermark strength, which can enhance the invisibility. Once the suspicious image data from Internet are misused and spreading the image data on Internet without authorization, especially the high value artwork image data, we can trace the misuse responsibility by extracting the watermark. And according to the above algorithm, we implemented the scheme as DRMChain based on the consortium blockchain which stored the artwork and DRM information in an un-tampered ledger for decentralized rights confirmation. Large amount of experiments indicate the proposed watermark-based trusted blockchain DRM scheme is secure, robust, and for the protection and misuse detection of image data.


Introduction
The snaking of piracy has brought incalculable losses to the image creators, which is particularly prominent in areas such as news, design, photography, and e-commerce. However, due to the fact that the image itself is difficult to identify with embezzlement, and it takes a long time to legal proceedings, the actual cost of the infringement is often chosen by the victim, which also contributes to the proliferation of piracy.
In recent years, with the ever-increasing awareness of copyright protection at the national, social, and individual levels, the protection of copyrights such as videos, music, and literature has taken a big step forward. However, due to some characteristics of the picture itself, the copyright protection process has progressed slowly. Whether online or offline, the content of the picture is indispensable, the value of the picture is increasingly prominent, and the protection of the copyright of the picture becomes inevitable. The report of 2017 China Network Copyright Industry Development Report shows the industry scale of China's core network copyright industry exceeded 500 billion yuan, with a high growth rate of 31.3% year-on-year. Compared with the protection of copyrights such as videos and music, the protection of copyright of picture is currently less concerned, and people's awareness of copyright is also relatively weak. In order to solve the current market infringement of such image infringement, researchers hope to solve the current situation of difficulty in defending rights through the technical, so that the original author can be traced by labelling their own work and engraving imprinted. Blind watermark is a kind of image watermark technology, which can hide digital info in the picture. The processed image does not seem to change, but in fact, the image already has its unique identifier. No matter whether it is cropped, pasted, rotated, zoomed, or added with text or filters, the content of the watermark will be affected in some degree. This enables copyright protection and tracking without damaging the original work and being unnoticed.
Digital watermarking [1,2] is a technique of using multimedia digital information such as images as a data carrier to embed copyright information, which can be visible or invisible. When a digital product copyright dispute occurs, the information in the data carrier can be extracted and verify the ownership of the copyright. Digital watermarking system generally includes two stages: watermark embedding and extracting. The indicators of evaluating the quality of the watermark system mainly include concealment, watermark capacity, robustness, and security [3].
From the perspective of the robustness of watermark resisting attacks, digital watermarking techniques can be divided into three types: robust, fragile, and semi-fragile [4][5][6][7]. Robust watermarks can be used against most image processing operations and be suitable for copyright and ownership verification, while fragile watermarks are sensitive to subtle modifications and are best suitable for authentication and integrity. According to the different fields of the hidden watermark, there are mainly two types: spatial domain watermarks and transform domain watermarks. Among them, the spatial domain-watermarking algorithm hides the watermark information by directly modifying the original signal. Although the watermark hiding and extraction process is simple, the robustness is not as good as the transform domain watermark. Therefore, in recent years, transform domain watermarking has attracted more attention. The watermarking algorithm based on discrete cosine transfer (DCT) has been widely used, and various watermarking algorithms based on discrete wavelet transfer (DWT) are the focus of current research, but these transform domain-watermarking algorithms are also facing the following challenges in research: (1) the watermarking algorithm based on DCT [8] has good compatibility with the commonly used image international compression standard. Therefore, this kind of algorithm can make full use of the characteristics of the compressed domain to hide the watermark information. However, such algorithms often choose the intermediate frequency coefficient to compromise the concealment and robustness of the watermark information, so it is difficult to resist the image processing attacks such as filtering and adding noise. (2) The watermarking algorithm based on DWT [9] can balance the characteristic of the watermark signal in the time domain and the frequency domain and can realize the fine analysis of different scales through the translation and zoom operations, so the characteristics of the signal can be extracted more effectively. The coefficients of the high-frequency sub-band obtained after wavelet analysis are mostly zero. If the watermark information is hidden in the high frequency, the high-frequency coefficient needs to be strictly selected. Compared with hidden low-frequency watermarks, hidden highfrequency watermarks have better resistance to geometric attacks, but they are not effective against low-pass filtering and JPEG lossy compression.
In [10], genetic algorithm optimization principles are employed and the strength of the watermark is controlled locally and according to the visual properties. The scheme is invisible to the human eyes and robust to a wide variety of common attacks. The disadvantage of this algorithm is that it is slow and not suited for real-time applications. A blind and highly robust watermarking scheme method for ownership verification and copyright protection has been presented in [11]. Watermarking is performed using principal component analysis (PCA) and Laplacian pyramid in contourlet transform. Wherever, it offers low payload. In [12], a novel blind watermarking algorithm is proposed. The algorithm is performed in DCT domain, using the correlation between two DCT coefficients of adjacent blocks in the same position. The watermarking algorithm is tested for some attacks, including JPEG compression, cropping, rotation, contrast enhancement, brightening, and sharpening. The disadvantage of this algorithm is that it is unable to embed a watermark bit in all the blocks, resulting in low capacity. In order to improve the payload capacity, all the blocks are used for the embedding purpose in [13]. The robustness of the proposed scheme has been examined for various singular and hybrid attacks, and a watermark of good quality is extracted even after various simultaneous attacks on the system. Considering for copyright protection, DRM misusing detection, data authentication, and digital content tracking for illegal distribution, the watermarks should be secure. And then numerous encryption methods have been used to improve security and confidentiality of watermarks.
A chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images has been presented in [14]. The watermark bit is embedded by modifying the difference between DCT coefficients of adjacent blocks. Arnold transform is used in addition to chaotic encryption to add double-layer security to the watermark. A new digital image watermarking model based on scrambling algorithm logistic and RSA asymmetric encryption algorithm has been presented in [15]. The scheme performed the hybrid decomposition of DWT and SVD on the host image, and the watermark is embedded into the low-frequency sub-band of the host. In [16], a novel chaos-based image encryption scheme using nonlinear inter-pixel computing and swapping-based permutation approach is presented. Simulation results demonstrate the high level of security for practical secret applications, but payload and imperceptivity have not been discussed in the paper. In [17], the watermarking image is encrypted by logistic map to enhance its confidentiality. The authors choose the region of interest of host image, and the experimental results show that the scheme does well against common attacks and geometric attacks. Although the scheme is secure to some degree, the imperceptivity and payload are not very good. In [18], the authors provide a promising solution to the security of watermarking. The watermark algorithm is performed in the encrypted domain, which means that the algorithm protects the original images from the third party embedders. The hybrid DCT and DWT methods are used to improve the robust performance of the scheme. Experiments demonstrate that the entire performance is satisfactory.
Recently, the improvement of DRM based on watermarking basically focused on algorithms. A new design scheme of DRM based on watermarking and blockchain is proposed in [19]. Blockchain is used to store watermark securely and provides timestamp authentication for multiple watermarks. Multiple watermarks and combine blockchain can prove the scheme which could improve copyright protection of multiple creations.
To address the abovementioned issues, we attempted to improve the security of watermarks based on ensuring high robustness. So we proposed a new image watermarking and blockchain scheme for DRM based on Arnold, human vision system (HVS), and DCT. The rest of this paper is organized as follows. In Section 2, we discuss the principle of Arnold, HVS, and DCT. In Section 3, the components of this DRM scheme based on digital watermarking are introduced, including watermark embedding and extracting processes. In Section 4, the simulation of this scheme is presented. In Section 5, we implemented the artwork DRM scheme and gave the blockchain data instance.

Preliminaries
In order to solve the problem of digital rights management misusing detection for multimedia content protection, we proposed a new watermarking scheme based on DCT transform domain. In the DCT watermarking algorithm, we embed watermark information into the low-and intermediate-frequency coefficients of the original digital image DCT transform domain. Firstly, after quantization process, watermark algorithm can enhance the ability of watermark information to resist compression attacks. Secondly, the coefficients in the DCT transform domain have the characteristics of the statistical distribution mathematical model. In theory, we can estimate the amount of the embedded watermark information. Thirdly, digital image watermarking through DCT transform will be dispersed into the whole image when doing the inverse DCT, so the embedded watermark information will not affect the compression, cutting, modification, and other attacks of the image. Therefore, the watermark based on DCT domain has high robustness and invisibility.

Security encryption
In order to enhance the robustness and security of the watermark, before embedding the watermark into the digital image, we first use the Arnold scrambling encryption algorithm to preprocess the watermark. Arnold transform is an encryption technique based on the combination of pixel displacement and matrix transformation, which can be encrypted by changing the position or gray value of pixels, so that even if the attacker extracts the watermark, the original watermark image cannot be obtained if the encryption method or encryption key is not known.

Two-dimensional Arnold transform
Two-dimensional Arnold transform is a commonly used transformation method. The Arnold transform formula of two-dimensional signal N × N is defined as follows: where y ∈ (0, 1, 2, …, N − 1), (x 1 , y 1 ) indicates the coordinates of a pixel point in the original matrix. (x 2 , y 2 ) indicates the coordinates of the pixel after transforming. Inverse Arnold transform is used to decrypt the Arnold encryption message by using Eq. (2).

Arnold transform effect
The original two-value watermark image is shown in Fig. 1a. The image is carried out using Arnold transform scrambling. Scrambling times is the encryption key of the watermark. The scrambling period corresponding to the order of the image subtracted from the scrambling times before is the decryption key. The graph is the result of watermark after 1, 2, 20 scrambling times.

Logistic map
Logistic map is a chaotic mapping method for one-dimensional, which is digital content security and other fields. The formula of logistic map is featured with a simple form, which is defined as follows: where X(k) is the mapping variable and u is the system mapping parameter. The function of logistic works in a disorder and unpredictable way, and the function is sensitive to the system mapping parameter u. [X(0), u] is used as the encrypted secret key.

Human visual system and Watson model 2.3.1 Human visual system
Background brightness masking, texture masking, and frequency masking effects of human vision system (HVS) are often applied to digital watermarking technology, which has a great relationship with the embedding strength and the value of the visible threshold value. In the visual system, brightness and frequency are much more important to image or video than color or direction. The higher the background brightness is, the less sensitive to the human eye. That is, background brightness can very well mask the change of image. In the transform domain algorithm, the human eye changes the image by the high-frequency coefficient or the diagonal coefficient, which does not reflect the change of the image, that is to say, the frequency coefficient can mask the change of the image. The more complex the image background texture is, the more difficult the human eye can judge the change of the image, the image texture can be changed by masking, so the embedding strength of the watermark can be increase moderately in the relatively complex background image.

Illuminance masking model
The illuminance model proposed in [20] is one of the human visual models (Fig. 2), the background brightness masking effect and the pattern. The masking effect and the frequency masking effect are also applicable to the Watson model. In this paper, we use the formula in this model to calculate the embedding strength.
From the background brightness masking properties, according to the Weber-Fechner law, the visual brightness masking properties can be expressed as follows: where L shows the background brightness and L + ΔL shows the brightness of the object that the human eye can observe. ΔL is the threshold that human visual organs can detect when brightness changes. Recent studies have shown that the mapping equation between ΔL and L is as follows: About frequency concealment characteristics, divide the image into 8 × 8 sub-blocks; the study of the frequency of 8 × 8 sub-blocks indicates that the sensitivity of the human eye decreases with the increase of frequency.

Texture masking model
Texture masking characteristics are also called contrastmasking characteristics. For the identification of contrast, there is no specific model at present. Usually, edge detection is used. Even in the case of high texture complexity, the human eye is still insensitive to image modification traces even if the watermark intensity is increased. Supposing two-dimensional image is f(x 1 , x 2 ) ∈ L 2 (R 2 ), the two-dimensional wavelet decomposition image is: where ∅(•) and ψ(•) are the horizontal filter function and vertical filter function respectively. σ (•) indicates the standard deviation function.

JPEG image compression and Watson DCT model 2.4.1 JPEG compression and DCT transform
Considering the image storage, the image data is commonly stored in a compressed way. JPEG is widely used in picture compression form, so we choose JPEG as an example of image data in our proposed multimedia content protection solution. In this scheme, robust watermark for DRM misusing detection is a binary image, which indicates some owner identification. We choose to embed watermarks based on the DCT coefficients in this scheme. JPEG compression usually divides the complete digital image into 8 × 8 blocks, DCT, and quantifies the luma samples of each block. The DCT of the two-dimensional signal f(x, y), x = 0, 1, …M − 1; y = 0, 1, …N − 1) is defined as follows: The inverse IDCT is defined as follows:

Watson DCT domain model
For the JPEG compression standard, we can use the visual model to calculate the quantization step size.
The quantization error of the quantized DCT coefficient is within JND. Watson have presented optimal JPEG quantization step size. For brightness-adaptive phenomenon, T L u;v;k is defined as follows: where c 0, 0, k represents the DC coefficients of block k, which means the brightness value of block image. c 0, 0 reflects the mean brightness of the whole image, which can be assigned c 0, 0 = 1024 when calculating. T u, v is the quantization step size matrix, independent on concrete images. Taking into account the contrast-masking effect, quantization step size can be obtained from the following formula, w u, v = 0.7: 3 Method: The proposed DRM misusing detection scheme based on watermark

Watermark scheme architecture for DRM misusing detection
The whole scheme includes two import parts. The first part is the watermarking embedding process. In the pre-processing of the input JPEG image, we convert the RGB image into YCbCr image, in which Y is the luminance signal, Cb is chrominance blue signal, and Cr is chrominance red signal of the image. The redundancy of luminance signal is more than that of the Cb signal and Cr signal, and the luminance Y signal is insensitive to watermark, so we select the luminance to embed the watermarks. After pre-processing the input image, the Y matrix could be divided into 8 × 8 blocks. And with each 8 × 8 DCT block, the watermark could be embedded in the DCT domain with HVS characteristics. The brightness equation is as follows: In the watermark security aspect, we utilize logistic mapping sequence and Arnold transform to encrypt watermark image to make it impossible for attacker to extract the watermark exactly especially when some knowledge of the watermark embedding algorithm has been gotten.

Watermark embedding algorithm for DRM misusing detection
In the watermark embedding algorithm, we select one M × N binary image as watermark W. W = {W(i, j)| 0 ≤ i < M, 0 ≤ j < N}, and W(i, j) ∈ {0, 1}. We scramble the binary image using Arnold transform for security and then convert the encrypted image into one-dimensional image sequence and then use logistic mapping to encrypt the one-dimensional sequence to encrypted watermark sequence, namely W = {w i }, i = 1, 2, …, C; C = M × N, w i = 0 or 1. The RGB of the host JPEG image is converted into YUV signals. And the Y luminance is divided into 8 × 8 blocks. The sequence of DCT coefficients of one block is recorded as D i (k), (k = 0, 1, 2, …63) in a zigzag scan form. i is the number of blocks. We choose a continuum of mid-frequency coefficients to embed watermark, such as D i (L), L = 3,4,…18.
The processing of coefficient D i (k) balances the robustness and transparency of watermark. The specific methods are as follows: where mod(.) indicates modular operation, sig(.) returns the symbol variable of the parameter, D i (k) is the DCT coefficient, i is the 8 × 8 block image number, and k is the coefficient number. In order to control the excessive increase of bit rate of the image data after watermark embedding, the watermark embedding algorithm only considers non-zero coefficients.
Mid-frequency coefficients are selected to embed watermarks. The choice of the mid-frequency coefficients directly affects the robustness and transparency of watermarks. Different modifications of DCT coefficients may bring different visual perception and different robustness of watermark. Figure 3 describes the relationship of, namely, different D i (k) and transparency and robustness. Peak signal to noise ratio (PSNR) is used to measure the transparency, and bit error is used to measure the robustness. The image Green bamboo is used as the host image, and watermark is random sequence.
In Fig. 4, the horizontal ordinate indicates the choice of D i (L)~D i (L + 4) to be embedded watermark. The left vertical ordinate is the PSNR between the host image and the watermarked JPEG image. For different L, the watermark is embedded in different coefficients; when L is small, the watermark is embedded in low-frequency coefficients, which may bring low PSNR but low bit error robustness, and when L is big, the watermark is embedded in mid-frequency coefficients, which may bring high PSNR but also high bit error. In Fig. 4, we find when L=10, the PSNR is near 39 dB, one maximum value in around the curve, and also the bit error is less than 2%. The main reasons may be as follows: (1) We can find when L=10, the coefficients to be embedded is D i (10)~D i (14), which are in the same layer in the zigzag scanning line and impact the 8 × 8 block image evenly.
(2) In JPEG compression table, the quantization step is not very big in the layer responding to L=10, which bring small quantization errors and some good balance between PSNR and bit error of the block image.
From the above analysis, we select D i (10)~D i (14) (L=10) as the watermark embedding coefficients.
From Formula 5, we can get Q i is related to the texture of the image. The much bigger Q i means the higher texture in the blocks of the image and the easier to embed watermarks.
For the host image is JPEG image, when the watermark is embedded, the watermarked image is often saved in JPEG format. The lossy compression of JPEG may attack the watermark in the saved JPEG image and bring some bit error in the extracted watermark process, so the choice of JPEG compression quality is very important. Meantime, the high quality may cause the storage volume to be very big, which is not very suitable for practical application. So in order to determine the bit error of the watermark and the storage volume of the watermarked image, some treatment measures will be used before the watermark embedding process is quite over.
Store watermarked JPEG image with compression quality factor Q = 100. And then extract the watermark from the stored image; if there is no bit error in the extracted watermark, store the watermarked JPEG image with the new compression quality factor Q = Q − 1, and so on. Until bit error happens, save the watermarked JPEG image with the final compression quality factor Q = Q + 1, then the watermark embedding process is complete.

Watermark extracting algorithm for DRM misusing detection
In the watermark extracting algorithm, we get one suspicious JPEG image for digital rights management. Convert the RGB signals of JPEG image into YUV signals and divide the Y luminance into 8 × 8 blocks, and then perform DCT transform on each block image. The sequence of DCT coefficients of one block is also recorded as D i (k), (k = 0, 1, 2, …63) in a zigzag scan form the same as the watermark embedding process, where i is the number of blocks. We choose a continuum of mid-frequency coefficients to extract watermark, such as D i (L), L = 10,11,…14. The watermark to be extracted is recorded as W n , where n is the number of watermark bit extracted. The watermark extracting methods are on the basis of the characteristics of DCT coefficients, and the specific methods are as follows: And then where i the number of block coefficient is D i (k) and n is the number of watermark bit. After all watermark bits are extracted, the watermark bits should be changed into a two-dimensional image signal, and then retrieve watermark image by reverse Arnold transform and reverse logistic mapping transform.

Experiments and evaluations of the watermark algorithm for DRM misusing detection
In this scheme, we designed a watermark-based effective DRM algorithm for misusing detection by embedding watermarks based on DCT, in which the robust watermark is for misusing detection process. In our scheme, we constructed the watermark in an image format with some copyright text information; thus, even if the image data is being attacked, the copyright text information can still be recognized in the image watermark and can parse the user-related information and then can be taken as an evidence by the image watermark.
In order to evaluate the transparency and robustness, we carry out various experiments about this scheme. In terms of watermark transparency, PSNR is used for evaluating the image quality objectively, which is defined as: where O − 1 reflects the maximum value of the original image pixels. MSE is the mean squared errors, given by Structural similarity index (SSIM) values can also be used to evaluate the quality of the watermarked image. The maximum value is 1 when both images are structurally similar.
where u X and u Y reflect the mean value of image X and image Y. σ X and σ Y reflect the standard deviation of image X and image Y. σ XY reflects the covariance of image X and image Y. Normalized cross correlation (NC) is a standard method for evaluating the degree of similarity between the original watermark image and the extracted watermark image, which is defined as: Bit error rate (BER) is defined as the ratio of watermark bit errors. BER is defined as follows: where n is total number of watermark bits, which are embedded.
In the experiment, some pictures taken on the Internet with the size of 2560 × 2560 are used. A binary logo of size 250 × 250 is used as watermark, which describes some info for misusing detection, such as right holder, date, and location information. Figure 5 shows the original image, binary watermark, and the corresponding watermarked image. The PSNR of watermarked image is 39.32 dB while quality factor is 100. The bit-error of the watermark extracted is 0.
After the host JPEG image is embedding the watermark for misusing, storage capacity of the watermarked JPEG file may be increased. To constraint the storage capacity, the watermarked JPEG image should be compressed with low quality factor and storage in a limit capacity. The index CIR (capacity increase ratio) will be used in this paper, which can be used as the percentage of image capacity increase ratio between the host image and the watermarked image.
where Capacity (Original) and Capacity (Watermarked) are the file capacity of the original image and the watermarked image capacity.
We can analyze the following conclusions from Table 1. When the quality factor decreases, the CIR of JPEG image decreases. CIR is lower than 0 when quality factor is below 90. When compression factor is reduced to 90, bit error may be happened.

Attacks and analysis of DRM watermark algorithm
In this experiment (see Fig. 5), we attack the watermarked image firstly and then verify whether we can extract the watermark from the attacked images. In the experiment, we gave the detailed experiments according to the six kinds of attacks: (1) copy and paste attack, (2) insert picture attack, (3) color inverse attack, and (4) horizontal rotate.
From the results in Fig. 6, in which the watermark can be easily recognized, it describes the information, such as right holder, date, and location information after the attacks.
For further experimental verification, we use different benchmark images as experimental object images (see Figs. 6 and 7). The watermark describes info for misusing detection, such as right holder, date, and location information. Table 2    According to the experimental results from Table 2, we draw the conclusion as follows: The CIR for different images are generally less than 0 when compression quality is 90, which means the file storage size of watermarked images cannot be increased very much after watermark embedding, even decreased for JPEG compression. Especially, CIR for image of high texture are commonly below zero, such as red plum and chrysanthemum. CIR for image of low texture are commonly above zero, such as orchid and green bamboo. The PSNR of the images are general above 38 dB, and the bit error of the identification watermarks is near 0.
The related methods are compared with the proposed schemes in terms of functionalities and performance.
Comparing with the current related schemes, our proposed scheme has the following three advantages and innovations: Obviously, in addition to the abovementioned analysis, the present schemes have another three advantages.
(1) Automatic watermark generation: Compared with some other watermark schemes, the watermark scheme is efficient. The security of watermark is very well for Arnold transform and logistic mapping transform. (2) Parameter control for watermark performance: Different quality of JPEG compression can control the quality of watermarked images, so as to balance the capacity of the image storage file and watermark performance, the watermark scheme can use quality of JPEG to compact the algorithm. Through experiments, we can see that the proposed watermark scheme is practical and effective, which can recognize the device-related information to trace and find the one who misuse or violate the confidential Internet pictures.
In Table 3, we can get that the watermark algorithm is embedded randomly and securely in the host images. So the robustness of watermark is very good against the attack of parts of ( Table 4). The bit error is 0 even when the tampering ratio is up to 1%. The algorithm is effective especially when parts of image rotate and color inverse attack happen, and the bit error is also very slow in the experiments.
5 Artwork DRM blockchain platform implementation and its blockchain data management

Artwork DRM blockchain platform implementation
Based on the above availability and security analysis of the digital rights management and its misusing detection technology, we implemented the artwork DRM platform (named DRMChain) based on Hyperledger Fabric 1.0 [21][22][23][24] consortium blockchain for authorized membership user service (see Figs. 8 and 9),   upon which authorized consortium users can find and confirm their interested artwork and can track the artwork's copyright information such as artwork's author, right holder, and date.

Artwork raw data management
When the user is using the DRMChain platform, he/ she firstly needs to register as user-level account, then he/she can commit his/her artwork, and the DRMChain will create the raw artwork and its corresponding blockchain data, which includes block data (block header) and the block transaction (block body).

Artwork DRM blockchain data creation
Upon the implementation of the consortium blockchain, the DRMChain first creates the blockchain channel and chain code and builds up the blockchain in the Docker system. When the raw artwork data is committed as a proposal in the DRMChain blockchain platform, the DRMChain creates the block-related discrete data and then commit the unconfirmed discrete data to the order peer; the order peer then confirmed and ordered the data in Kafka or Solo mode; once the data is confirmed in the blockchain system, the artwork data is formally stored in all the related peers and created its corresponding blockchain data structure. Table 5 shows an instance of a raw artwork data and its corresponding blockchain data (block header and body):

Artwork DRM blockchain data management
As for the blockchain, data is created and confirmed by cryptography-based digital signature with unique timestamp, and each block (except for the genesis block) is linked with the previous block which is ensured by un-tampered hash algorithm, and the consortium-based DRMChain platform can provide authorization access, isolation of different level user data, privacy protection, and high-level TPS (transaction per second). Thus, the DRMChain can provide a techniquebased, fair, and trusted artwork content protection solution, in which the artwork is protected by the content provider with watermark (the unauthorized fake artwork can NOT provide the authorized watermark); the DRMChain is useful for artwork content exhibition and exchange.

Conclusions
A new watermarked-based image data security scheme for digital rights management misusing detection was proposed in this paper. We embedded the information,