To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Network based traitor-tracing technique using traffic pattern
1. GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com
Network-based traitor-tracing technique using traffic
pattern
Abstract
Today, with the rapid advance in broadband technology, streaming technology is applied to
many applications, such as content delivery systems and web conference systems. On the other
hand, we must implement digital rights management (DRM) to control content spreading and to
avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM
systems, and enables content distributors to observe and control content reception. General
methods make use of watermarking to provide users' individual information unique to each user.
However, these methods need to produce many individual contents. Especially, this is not
realistic for real-time streaming systems. Furthermore, watermarking, which is a key technology
adopted by contemporary methods, has known limitations and attacks against it. This is why the
authors have proposed a method to monitor the content stream using traffic patterns constructed
from only traffic volume information obtained from routers. The proposed method can determine
who is watching the streaming content and whether or not a secondary content delivery exists.
This information can be also used with general methods to construct a more practical traitor-tracing
system. A method to cope with random errors and burst errors has also been investigated.
Finally, the results of simulation and practical experiment are provided demonstrating the
effectiveness of the proposed approach.
2. Existing System
Today, with the rapid advance in broadband technology, streaming technology is applied to
many applications, such as content delivery systems and web conference systems. On the other
hand, we must implement digital rights management (DRM) to control content spreading and to
avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM
systems, and enables content distributors to observe and control content reception. General
methods make use of watermarking to provide users' individual information unique to each user.
However, these methods need to produce many individual contents. Especially, this is not
realistic for real-time streaming systems. Furthermore, watermarking, which is a key technology
adopted by contemporary methods, has known limitations and attacks against it.
Proposed system
This is why the authors have proposed a method to monitor the content stream using traffic
patterns constructed from only traffic volume information obtained from routers. The proposed
method can determine who is watching the streaming content and whether or not a secondary
content delivery exists. This information can be also used with general methods to construct a
more practical traitor-tracing system. A method to cope with random errors and burst errors has
also been investigated. Finally, the results of simulation and practical experiment are provided
demonstrating the effectiveness of the proposed approach.
System Requirements:
Hardware Requirements:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 44 Mb.
Monitor : 15 VGA Colour.
Ram : 512 Mb.
3. Software Requirements:
Operating system : Windows XP/7.
Coding Language : net, C#.net
Tool : Visual Studio 2010