Automatically Recombined Fingerprints for Privacy Preserving In Improved Peer-To-Peer Multimedia Distribution

Authors(4) :-Radha Mothukuri, Naidu.Lakshmibhavani, Padarthi.Niharika, Mandapalli Sukanya

Unknown unique mark has been proposed as a helpful answer for the lawful dissemination of sight and sound substance with copyright insurance while saving the security of purchasers, whose characters are just uncovered if there should arise an occurrence of unlawful re-appropriation. Notwithstanding, the vast majority of the current unknown fingerprinting conventions are unreasonable for two principle reasons: 1) the utilization of complex tedious conventions and/or homomorphic encryption of the substance, and 2) a unicast approach for conveyance that does not scale for an expansive number of purchasers. This paper originates from a past proposition of recombined fingerprints which conquers some of these disadvantages. In any case, the recombined unique finger impression approach requires a mind boggling chart hunt down deceiver following, which needs the investment of different purchasers, and genuine intermediaries in its P2P conveyance situation. This paper concentrates on evacuating these disservices bringing about a productive, adaptable, security safeguarding and P2P-based fingerprinting framework.

Authors and Affiliations

Radha Mothukuri
Assistant Professor, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India
Naidu.Lakshmibhavani
B.Tech, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India
Padarthi.Niharika
B.Tech, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India
Mandapalli Sukanya
B.Tech, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India

Recombined Fingerprinting, Cryptographic, Content Uploading And Splitting

  1. Hiroki Nishiyama, Senior Member, IEEE, Desmond Fomo, Student Member, IEEE, Zubair Md. Fadlullah, Member, IEEE, and Nei Kato, Fellow, IEEE, “Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks”.
  2. David Meg´?as, Member, IEEE , “Improved Privacy-PreservingP2PMultimedia DistributionBasedonRecombined Fingerprints”
  3. D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Advances in
  4. Cryptology-CRYPTO’95,LNCS963,Springer, pp. 452-465, 1995.
  5. Y. Bo, L. Piyuan, and Z. Wenzheng, An efficient anonymous fingerprinting protocol. Computational Intelligence and Security, LNCS 4456, Springer, pp. 824–832, 2007.
  6. J. Camenisch, “Efficient anonymous fingerprinting with group signatures,” Asiacrypt 2000, LNCS 1976, Springer, pp. 415–428, 2000.
  7. C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh,“An efficient and fair buyer-seller fingerprinting scheme for large scale networks,” Computers & Security, vol. 29, pp. 269–277, Mar. 2010.
  8. J. Domingo-Ferrer and D. Meg´?as, “Distributed multicast of fingerprinted content based on a rational peer-to-peer community,” Computer Communications, vol. 36, pp. 542–550, Mar. 2013.
  9. I. J. Cox, M. L. Miller, J. A. Bloom, J.Fridrich,andT.Kalker,Digital Watermarking and Steganography. Burlington MA: Morgan Kaufmann, 2008.
  10. David Megras .Joesp Domingo-Ferrer.“privacy-AwarePeer-to-PeerContent DistributionUsingAutomatically Recombined FingerPrints”
  11. SAURABH AGGARWAL, JOY KURI and CHANDAN SAHA. “Give-and-take based peer-to-peer content distribution networks”

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 81-86
Manuscript Number : CSEIT1833618
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Radha Mothukuri, Naidu.Lakshmibhavani, Padarthi.Niharika, Mandapalli Sukanya, "Automatically Recombined Fingerprints for Privacy Preserving In Improved Peer-To-Peer Multimedia Distribution", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.81-86, March-April.2018
URL : http://ijsrcseit.com/CSEIT1833618

Follow Us

Contact Us