Automatically Recombined Fingerprints for Privacy Preserving In Improved Peer-To-Peer Multimedia Distribution

Authors

  • Radha Mothukuri  Assistant Professor, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India
  • Naidu.Lakshmibhavani  B.Tech, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India
  • Padarthi.Niharika  B.Tech, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India
  • Mandapalli Sukanya  B.Tech, Department of CSE , QIS College of Engineering and Technology, Ongole, Andhra Pradesh , India

Keywords:

Recombined Fingerprinting, Cryptographic, Content Uploading And Splitting

Abstract

Unknown unique mark has been proposed as a helpful answer for the lawful dissemination of sight and sound substance with copyright insurance while saving the security of purchasers, whose characters are just uncovered if there should arise an occurrence of unlawful re-appropriation. Notwithstanding, the vast majority of the current unknown fingerprinting conventions are unreasonable for two principle reasons: 1) the utilization of complex tedious conventions and/or homomorphic encryption of the substance, and 2) a unicast approach for conveyance that does not scale for an expansive number of purchasers. This paper originates from a past proposition of recombined fingerprints which conquers some of these disadvantages. In any case, the recombined unique finger impression approach requires a mind boggling chart hunt down deceiver following, which needs the investment of different purchasers, and genuine intermediaries in its P2P conveyance situation. This paper concentrates on evacuating these disservices bringing about a productive, adaptable, security safeguarding and P2P-based fingerprinting framework.

References

  1. Hiroki Nishiyama, Senior Member, IEEE, Desmond Fomo, Student Member, IEEE, Zubair Md. Fadlullah, Member, IEEE, and Nei Kato, Fellow, IEEE, “Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks”.
  2. David Meg´ıas, Member, IEEE , “Improved Privacy-PreservingP2PMultimedia DistributionBasedonRecombined Fingerprints”
  3. D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Advances in
  4. Cryptology-CRYPTO’95,LNCS963,Springer, pp. 452-465, 1995.
  5. Y. Bo, L. Piyuan, and Z. Wenzheng, An efficient anonymous fingerprinting protocol. Computational Intelligence and Security, LNCS 4456, Springer, pp. 824–832, 2007.
  6. J. Camenisch, “Efficient anonymous fingerprinting with group signatures,” Asiacrypt 2000, LNCS 1976, Springer, pp. 415–428, 2000.
  7. C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh,“An efficient and fair buyer-seller fingerprinting scheme for large scale networks,” Computers & Security, vol. 29, pp. 269–277, Mar. 2010.
  8. J. Domingo-Ferrer and D. Meg´ıas, “Distributed multicast of fingerprinted content based on a rational peer-to-peer community,” Computer Communications, vol. 36, pp. 542–550, Mar. 2013.
  9. I. J. Cox, M. L. Miller, J. A. Bloom, J.Fridrich,andT.Kalker,Digital Watermarking and Steganography. Burlington MA: Morgan Kaufmann, 2008.
  10. David Megras .Joesp Domingo-Ferrer.“privacy-AwarePeer-to-PeerContent DistributionUsingAutomatically Recombined FingerPrints”
  11. SAURABH AGGARWAL, JOY KURI and CHANDAN SAHA. “Give-and-take based peer-to-peer content distribution networks”

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Radha Mothukuri, Naidu.Lakshmibhavani, Padarthi.Niharika, Mandapalli Sukanya, " Automatically Recombined Fingerprints for Privacy Preserving In Improved Peer-To-Peer Multimedia Distribution, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.81-86, March-April-2018.