
The recent creation of Non Fungible Tokens (NFTs) has enabled a multibillionaire market for digital artistic works including images or sequence of images, videos, and animated gifs. With this new trend issues regarding fraud, stolen works, authenticity, and copyright came along. The goal of this chapter is to provide an overview of the watermarking techniques that can be employed to mitigate those issues. We will discuss transparency, robustness, and payload of watermarking techniques aiming to educate the artists, researchers, and developers about the many approaches that watermarking techniques provide and the resulting trade-offs. We focus on fragile watermarking techniques due to their high transparency for embedding into artistic works. We discuss the spread spectrum and Least Significant Bit techniques. We describe the usual process of NFT minting into a blockchain and propose a more secure certification protocol with watermarking which employs the same usual NFT minting offered by current marketplaces. The proposed certification protocol mints a checksum string into a blockchain, ensuring the validity of the watermark and the information embedded into this watermark. This proposed protocol validates the date of creation and author identification which are transparently embedded in the artistic work, thus, increasing the security and confidence of markets for artistic works transactions.
Image Encryption, Artificial intelligence, Alternative medicine, Certification, FOS: Political science, Robustness (evolution), FOS: Law, Watermarking, Biochemistry, Gene, Transparency (behavior), Computer security, Image Forgery Detection, Image (mathematics), Pathology, Political science, Chaos-based Image Encryption Techniques, Network packet, Digital Image Watermarking Techniques, Computer science, Payload (computing), Chemistry, Color Image Encryption, Image Authentication, Authentication (law), Digital Watermarking Alliance, Computer Science, Physical Sciences, Watermark, Protocol (science), Medicine, Computer Vision and Pattern Recognition, Digital watermarking, Digital Image Forgery Detection and Identification, Law, Embedding
Image Encryption, Artificial intelligence, Alternative medicine, Certification, FOS: Political science, Robustness (evolution), FOS: Law, Watermarking, Biochemistry, Gene, Transparency (behavior), Computer security, Image Forgery Detection, Image (mathematics), Pathology, Political science, Chaos-based Image Encryption Techniques, Network packet, Digital Image Watermarking Techniques, Computer science, Payload (computing), Chemistry, Color Image Encryption, Image Authentication, Authentication (law), Digital Watermarking Alliance, Computer Science, Physical Sciences, Watermark, Protocol (science), Medicine, Computer Vision and Pattern Recognition, Digital watermarking, Digital Image Forgery Detection and Identification, Law, Embedding
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 2 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
