IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 3, March 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Enhanced Private Preservative Multimedia Sharing Data Relying On Collective Finger Prints

[Full Text]

 

AUTHOR(S)

Chundru Trinadh Sri Murali Krishna, Pellakuri Vidyullatha

 

KEYWORDS

Collaboration, Cryptography, Hashing, Peer-to-peer Content Distribution, Proxies, Recombined Fingerprints, Unicast.

 

ABSTRACT

Indefinite selective stain has been proposed as an accommodating response for the authentic course of sight and sound substance with copyright security while ensuring the assurance of buyers, whose characters are simply shown if there ought to be an event of illegal re-allotment. Regardless, most of the present obscure fingerprinting shows is unreasonable for two guideline reasons. This paper stems from a past proposal of recombined fingerprints that overcomes a portion of these drawbacks. In any case, the recombined exceptional finger impression approach requires an unusual chart search for deceiver following, which needs the collaboration of various buyers, and genuine middle people in its Peer-to-peer course circumstance. This paper bases on emptying these damages realizing a beneficial, adaptable, assurance protecting and Peer-to-peer based fingerprinting system.

 

REFERENCES

[1] D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” in Proc. 15th Ann. Int. Cryptology Conf. Adv. Cryptology, 1995, pp. 452–465.
[2] Y. Bo, L. Piyuan, and Z. Wenzheng, “An efficient anonymous fingerprinting protocol,” in Proc. Int. Conf. Comput. Intell. Security, 2007, pp. 824–832.
[3] J. Camenisch, “Efficient anonymous fingerprinting with group signatures,” in Proc. 6th Int. Conf. Theory Appl. Cryptology Inf. Security: Adv. Cryptology, 2000, pp. 415–428.
[4] C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh, “An efficient and fair buyer-seller fingerprinting scheme for large scale networks,” Comput. Security, vol. 29, pp. 269–277, Mar. 2010.
[5] D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, pp. 84–90, Feb. 1981.
[6] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Burlington, MA, USA: Morgan Kaufmann, 2008.
[7] J. Domingo-Ferrer and D. Meg ıas, “Distributed multicast of fingerprinted content based on a rational peer-to-peer community,” Comput. Commun., vol. 36, pp. 542–550, Mar. 2013.
[8] M. Fallahpour and D. Meg ıas, “Secure logarithmic audio watermarking scheme based on the human auditory system,” Multimedia Syst., vol. 20, pp. 155–164, 2014.
[9] S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M. Maas, “A buyer-seller watermarking protocol based on secure embedding,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 783–786, Dec. 2008.
[10] M. Kuribayashi, “On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol,” EURASIP J. Inf. Security, vol. 2010, pp. 1:1–1:11, Jan. 2010.