Method
|
Advantage
|
Disadvantage
|
Blockchain based |
Decentralized, tamper-proof, transparent, traceable, reliable, secure |
Cost of infrastructure, lack of knowledge of implementation, lack of standardization |
Graph based |
Simple, secure, low cost |
Time and energy consuming |
Watermarking algorithm |
Robustness against noise, low PSNR, preserve information |
Need to be more secure |
Identity based |
Fast, secure, efficient for normal and emergency situation |
Not mentioned |
Homomorphic |
High levels of security and privacy |
Time-consuming |
Attribute based signature |
Suitable for anonymous authentication and privacy access control |
Heavy computation |