1,379 research outputs found

    MAINTAINING OF USER PRIVACY BY MANAGING RELIABLE VIDEO DELIVERY

    Get PDF
    Due to the recognition of streaming delivery of movies, expansion of P2P streaming software has concerned much consideration. These technologies improve the allocation of any type of information above Internet. In our work we study on unlawful redistribution of streaming content by means of authorized user towards external networks. Throughout process of video streaming, changes of amount of traffic come out as an exceptional waveform particular to content consequently by monitoring information recovered at various nodes within network, leakage of content can be noticed. In our work we put forward a novel scheme of content-leakage detection that is robust towards variation of video length. The traditional approaches, specifically, time slot-based traitor tracing (T-TRAT) uses algorithm of time slot-based pattern generation and weakens user-side traffic pattern; packet size-based traitor tracing (P-TRAT), along with DP-based traitor tracing (DP-TRAT) makes use of traffic pattern generation technique based on packet size thus, both of them confirms robustness against packet delay as well as jitter

    ACHIEVING OF EFFECTIVE VIDEO STREAMING BY USER PRIVACY MANAGEMENT

    Get PDF
    Due to popularity of streaming applications in recent years, reliable video delivery to suspend objectionable content-leakage has, certainly, turn out to be important. Traffic patterns with reference to streaming videos symbolize the skeleton carrying their features and are exceptional per content.  In our work we focus on illicit redistribution of streaming content by means of an allowed user towards external networks. By comparing videos of distinctive length, in our work we determine a relationship among length of videos to be evaluated and their resemblance. In our work we suggest an innovative content-leakage detection system that is robust to variation of video length. The system that was introduced assist in flexible as well as precise streaming content leakage detection regardless of length of streaming content, which improve secured and trustworthy content delivery

    Framework for privacy-aware content distribution in peer-to- peer networks with copyright protection

    Get PDF
    The use of peer-to-peer (P2P) networks for multimedia distribution has spread out globally in recent years. This mass popularity is primarily driven by the efficient distribution of content, also giving rise to piracy and copyright infringement as well as privacy concerns. An end user (buyer) of a P2P content distribution system does not want to reveal his/her identity during a transaction with a content owner (merchant), whereas the merchant does not want the buyer to further redistribute the content illegally. Therefore, there is a strong need for content distribution mechanisms over P2P networks that do not pose security and privacy threats to copyright holders and end users, respectively. However, the current systems being developed to provide copyright and privacy protection to merchants and end users employ cryptographic mechanisms, which incur high computational and communication costs, making these systems impractical for the distribution of big files, such as music albums or movies.El uso de soluciones de igual a igual (peer-to-peer, P2P) para la distribución multimedia se ha extendido mundialmente en los últimos años. La amplia popularidad de este paradigma se debe, principalmente, a la distribución eficiente de los contenidos, pero también da lugar a la piratería, a la violación del copyright y a problemas de privacidad. Un usuario final (comprador) de un sistema de distribución de contenidos P2P no quiere revelar su identidad durante una transacción con un propietario de contenidos (comerciante), mientras que el comerciante no quiere que el comprador pueda redistribuir ilegalmente el contenido más adelante. Por lo tanto, existe una fuerte necesidad de mecanismos de distribución de contenidos por medio de redes P2P que no supongan un riesgo de seguridad y privacidad a los titulares de derechos y los usuarios finales, respectivamente. Sin embargo, los sistemas actuales que se desarrollan con el propósito de proteger el copyright y la privacidad de los comerciantes y los usuarios finales emplean mecanismos de cifrado que implican unas cargas computacionales y de comunicaciones muy elevadas que convierten a estos sistemas en poco prácticos para distribuir archivos de gran tamaño, tales como álbumes de música o películas.L'ús de solucions d'igual a igual (peer-to-peer, P2P) per a la distribució multimèdia s'ha estès mundialment els darrers anys. L'àmplia popularitat d'aquest paradigma es deu, principalment, a la distribució eficient dels continguts, però també dóna lloc a la pirateria, a la violació del copyright i a problemes de privadesa. Un usuari final (comprador) d'un sistema de distribució de continguts P2P no vol revelar la seva identitat durant una transacció amb un propietari de continguts (comerciant), mentre que el comerciant no vol que el comprador pugui redistribuir il·legalment el contingut més endavant. Per tant, hi ha una gran necessitat de mecanismes de distribució de continguts per mitjà de xarxes P2P que no comportin un risc de seguretat i privadesa als titulars de drets i els usuaris finals, respectivament. Tanmateix, els sistemes actuals que es desenvolupen amb el propòsit de protegir el copyright i la privadesa dels comerciants i els usuaris finals fan servir mecanismes d'encriptació que impliquen unes càrregues computacionals i de comunicacions molt elevades que fan aquests sistemes poc pràctics per a distribuir arxius de grans dimensions, com ara àlbums de música o pel·lícules

    Traffic Pattern-Based mostly Content Leak Detection for Trustworthy Content Delivery Networks

    Get PDF
    Due to the increasing quality of transmission streaming applications and services in recent years, the difficulty of sure video delivery to stop undesirable content-leakage has, indeed, become crucial. While conserving user privacy, typical systems have addressed this issue by proposing strategies supported the observation of streamed traffic throughout the network.These standard systems maintain a high detection accuracy whereas managing a number of the traffic variation within network delay and packet loss and their detection performance well degrades thanks to the many variation of video lengths.In this paper, we focus on the solution overcoming this issue by proposing a unique content-leakage detection theme that's strong to the variation of the video length.By comparison videos of various lengths, we tend to confirm a relation between the length of videos to be compared and also the similarity between the compared videos.Therefore, we tend to enhance the detection performance of the projected theme even in associate degree setting subjected to variation long of video.Through a experimentation and testing procedure , the potential of achieving of our projected theme is evaluated in terms of variation within the length of video , delay in qualities of video, and loss of packets

    Behavior modeling and forensics for multimedia social networks

    Full text link

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
    corecore