Multimedia Domain Report Security Scenario in the Cloud Environment

Authors

  • G. Shirila  CVR College of Engineering/CSE, Hyderabad, India
  • B. Ram Babu  Professor CVR College of Engineering/CSE, Hyderabad, India

Keywords:

Multimedia Object, Three-Dimensional, Content-Based, Cloud Infrastructures, Software Resources, Distributed Matching Engine, Hardware.

Abstract

Distribution of utilize interactive media objects through uploading visitors to wired hosting sites can significance in elementary scarce revenues for substance producers. Systems recommended to discover clones of interactive media objects loosen up and struggle and prominent. We recommend a palimpsest the intend decisive mixed media fulfilled insurance systems. We direct the program to safeguarding mixed media idea, that's idea-based copy acknowledgment how signatures are detached inventive objects. Our physiques for intermedia composition safeguard discovers illicitly made copies of interactive media objects on the internet. Our produce attains fast business of matter security systems, as it hangs on perplex infrastructures that submit computing plumbing counting shareware sources. It's two new components like an approach of provoke signatures of three-dimensional and dispersed parallel transformer for mixed media objects.

References

  1. H. Muller, W. Müller, D. Squire, S. Marchand-Maillet, and T. Pun, "Performance evaluation in content-based image retrieval: Overview and proposals," Pattern Recog. Lett., vol. 22, no. 5, pp. 593-601, Apr. 2001.
  2. J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," in Proc. Symp. Oper. Syst. Design Implementation (OSDI’04), San Francisco, CA, USA, Dec. 2004, pp. 137-150.
  3. P. Cano, E. Batle, T. Kalker, and J. Haitsma, "A review of algorithms for audio fingerprinting," in Proc. IEEE Workshop Multimedia Signal Process., Dec. 2002, pp. 169-173.
  4. N. Khodabakhshi and M. Hefeeda, "Spider: A system for finding 3D video copies," in ACM Trans. Multimedia Comput., Commun., Appl. (TOMM), Feb. 2013, vol. 9, no. 1, pp. 7:1-7:20.
  5. A. Kahng, J. Lach, W. Mangione-Smith, S. Mantik, I. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, "Watermarking techniques for intellectual property protection," in Proc. 35th Annu. Design Autom. Conf. (DAC’98), San Francisco, CA, USA, Jun. 1998, pp. 776-781.
  6. P. Ram and A. Gray, "Which space partitioning tree to use for search," in Proc. Adv. Neural Inf. Process. Syst. (NIPS’13), Lake Tahoe, NV, USA, Dec. 2013, pp. 656-664.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
G. Shirila, B. Ram Babu, " Multimedia Domain Report Security Scenario in the Cloud Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.393-396, November-December-2017.