You are on page 1of 15

MAULANA AZAD

NATIONAL INSTITUTE OF TECHNOLOGY


BHOPAL, INDIA, 462003

Digital rights management through Blockchain


Minor Project
Vth Semester

Submitted by:
Shashank Mangal 201112079 Under the Guidance of
Aashu Rajput 201112044 Dr. Deepak Singh Toma
(Associate Professor, H.O.D)
Tarun Mahawar 201112074
  DEPARTMENT OF COMPUTER SCIENCE &
Vedant Singh 201112052 ENGINEERING
  Session: 2022-2023
Digital Right Management
through Blockchain
Abstract
● Digital documents are replacing physical copies at a very fast
pace. But with the increasing technology, there are software's
that can always alter digital documents nuancedly. Hence,
there is a need for a robust digital authentication system for
digital documents.Digital document verification involves
verifying the authenticity of a document through online
means
● We can encrypt the documents using advanced encryption
standard algorithms, send and receive documents using
ethereum blockchain smart contracts.
Analysis
• With the help of digital rights management, it’s possible to
authenticate digital documents. The strategy which are we
are going to use advanced standard encryption algorithms
that can be recovered with these methods, we can digitally
authenticate the image.
• The authentication records of digitally signed documents
need to be stored somewhere . we can't rely on central
cloud facility because once the cloud facility is destroyed
all the records are destroyed as well . so we need a robust
database.
UML Activity Chart
Gantt Chart
Technology Required
The tools which are we are going to use our
• MD5 hash
It applies mathematical algorithm to generate a digital
signature of file.
• Steganography
It is used for hiding digital message in the documents
which can be received accordingly through interfaces.
• Digitally hidden hallmarks in images
With this technology a logo will be digitally hidden in
the image which can be received accordingly.
Digital Hallmark
Watermarking schemes under transform domain
watermarks are discrete wavelet transfer (DWT)
and discrete cosine transfer (DCT) will be used.
For a typical image, the DCT has the property
that most of the visually significant information
about the image is concentrated in a few
coefficients of the DCT.

Fig : Watermarked Image after


applying algorithm
MD5 hashing
MD5 (message-digest algorithm) is a cryptographic protocol
used for authenticating messages as well as content verification
and digital signatures. MD5 runs entire files through a
mathematical hashing algorithm to generate a signature that can
be matched with an original file. That way, a received file can
be authenticated as matching the original file that was sent,
ensuring that the right files get where they need to go.

Fig: MD5 Hashing algorithm


Image Steganography
As the name suggests, Image
Steganography refers to the process of
hiding data within an image file. The
image selected for this purpose is
called the cover image and the image
obtained after steganography is called
the stego image.
Fig: Encrypted image after applying
steganography
Ethereum BlockChain
“Ethereum is a global, open - source platform for
decentralized applications (Dapps)”
Ethereum liberated the blockchain technology from
the financial limits of BitCoin & it is a
programmable blockchain. where peer to peer
networks would replace the client server model, any
data would be owned only by its creator, there
would be no monopoly of data and applications
won’t steal data.
.

Fig: Generalized Blockchain Network


.
Applications
• It can help companies control access to their confidential
information , they can use these advanced standard
technologies to restrict access to sensitive data while at the
same time allowing it to be shared securely.
• To protect the data like sensitive patents, trademarks,
customer information and process across multiple storage
platform.
• It helps author retain their ownership of their work.
References
• https://www.avast.com/c-md5-hashing-algorithm
• https://www.geeksforgeeks.org/image-steganography-in-
cryptography/
• https://en.wikipedia.org/wiki/Digital_watermarking
• https://corpgov.law.harvard.edu/2018/05/26/an-introduction-to-
smart-contracts-and-their-potential-and-inherent-limitations/

• https://www.investopedia.com/terms/b/blockchain.asp
Thank You !

You might also like