Effective Video Copy Detection Technique of Multimedia Content in Cloud Environment

Authors

  • Shubham DilipVyawahare   Department of Information Technology, Anuradha Engineering College, Chikhli, Maharashtra, India
  • Dr. Avinash Kapse  Associate Professor & HOD, Department of Information Technology, Anuradha Engineering College, Chikhli, Maharashtra, India

Keywords:

Cloud storage, Digital signatures, scalability, protection channels and database.

Abstract

In a view of large-scale multimedia content protection systems and the charges to provide cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. We proposing a system that can be used to protect different multimedia content types, including 2-D videos, 3-D videos, images, audio clips, songs, and music clips. It can be implemented on private and/or public clouds. We design a system with two method processing: (i) Creating digital signatures, and (ii) Comparison database to recognized modifications. The signature method creates robust and representative signatures of contents. Comparison with storage that is real in cloud with the available content. The high accuracy and scalability of the proposed system include high database and storage content. In addition, we compared our system to the protection system used by some videos channels.

References

  1. Abdelsadek, “Distributed index for matching multimedia objects,” M.S. thesis, School of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada, 2014.
  2. Abdelsadek and M. Hefeeda, “Dimo: Distributed index for matching multimedia objects using MapReduce,” in Proc. ACMMultimedia Syst. Conf. (MMSys’14), Singapore, Mar. 2014, pp. 115–125.
  3. M. Aly, M. Munich, and P. Perona, “Distributed Kd-Trees for retrieval from very large image collections,” in Proc. Brit. Mach. Vis. Conf. (BMVC), Dundee, U.K., Aug. 2011.
  4. J. Bentley, “Multidimensional binary search trees used for associative searching,” in Commun. ACM, Sep. 1975, vol. 18, no. 9, pp. 509–517.
  5. P. Cano, E. Batle, T. Kalker, and J. Haitsma, “A review of algorithms for audio fingerprinting,” in Proc.
  6. Privacy-Preserving Public Auditing for Secure Cloud Storage (I. Agudo, D. Nu˜ nez, G. Giammatteo, P. Rizomiliotis, and C. Lambrinoudakis, “Cryptography goes to the cloud,” in Secure and Trust Computing, Data Management, and Applicat., 2011, pp. 190– 197.)
  7. Efficient and Secure Multi-Keyword Search   on Encrypted Cloud Data (G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. 14th ACM conf. Compu. Commun. Security (CCS), 2007, pp. 598–609.)
  8. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud (G. Ateniese, A. Faonio, and S. Kamara, “Leakage-resilient identification schemes from zero-knowledge proofs of storage,” in IMA Inte. Conf. Cryptography and Coding, 2015, pp. 311–328)
  9. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud (G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secure and Privacy in Commun. Netw. (SecureComm), 2008, pp. 1–10.)
  10. Remote Data Checking for Network Coding-based Distributed Storage Systems(K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: theory and implementation,” in Proc. 2009 ACM Workshop Cloud Computing Security (CCSW), 2009, pp. 43–54.)
  11. Short Group Signatures(L. Chen, “Using algebraic signatures to check data possession in cloud storage,” Future Generation Computer Systems, vol. 29, no.7, pp. 1709–1715, 2013.)
  12. Storing Shared Data on the Cloud via Security-Mediator (Y. Dodis, S. Vadhan, and D. Wichs, “Proofs of retrievability viahardness amplification,” in Proc. Theory Cryptography Conf. (TCC), 2009, pp. 109–127.,)

Downloads

Published

2020-09-30

Issue

Section

Research Articles

How to Cite

[1]
Shubham DilipVyawahare , Dr. Avinash Kapse, " Effective Video Copy Detection Technique of Multimedia Content in Cloud Environment" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 11, pp.57-66, September-2020.