SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1703
Secure Multimedia Content Protection and Sharing
Anitha. V1, Priyanka .R2 , Subburam.S3 ,Kapila Vani R.K4
1,2 Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering
College, Chennai, India
3 Professor,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy
Engineering College, Chennai, India
4Assistant Professor, Department of Computer Science and Engineering, Prince Dr. K. Vasudevan College of
Engineering and Technology, Chennai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— Deliberate or inadvertent spillage of classified
information is without a doubt a standout amongst the most
serious security dangers that associations confront in the
computerized period. The danger now reaches out to our own
lives: a plenty of individual data is accessible to informal
communities and cell phone suppliers and is in a roundabout
way exchanged to deceitful outsider and fourth meeting
relevance. In this occupation, we show a non-detailed in
sequence extraction system LIME for information streamover
different elements that take two trademark, vital parts (i.e.,
proprietor and buyer). We characterize the correct security
ensures required by such an information ancestry instrument
toward distinguishing proof of a liable substance, and
recognize the improving non-renouncement and genuineness
suspicions. We then create and dissect a novel responsible
informationexchangeconventionbetweentwoelementsinside
a vindictive domain by expanding upon unaware exchange,
vigorous watermarking, and signatureprimitives. Atlonglast,
we play out a test assessment to exhibit the common sense of
our convention what's more, apply our structuretothecritical
information spillagesituationsofinformationoutsourcing and
interpersonal organizations. By and large, we consider LIME,
our heredity structure for information exchange, to be a key
stride towards accomplishing responsibility by plan.
Key Words: Cloud storage,public audit,Data integrity,Third
Party Auditor (TPA) Data privacy preserving.
1. INTRODUCTION
In the advanced time, data spillage through inadvertent
exposures, on the other hand deliberate damage by
displeased workers and pernicious outer elements, show a
standout amongst the most genuine dangers to associations.
As indicated by afascinatingorderofinformationbreakskept
up by the Privacy Rights Clearinghouse (PRC), in the United
States alone, 868, 045, 823 records have been broken from4,
355 information ruptures made open since 2005. It is not
hard to trust this is quite recently the tip of the icy mass, as
most instances of data spillage go unreported because of
dread of loss of client certainty or administrative
punishments: it costs organizations by and large $214 per
bargained record. Substantial measures of computerized
information can be replicated at no cost and can be spread
through the web in brief time. Furthermore, the danger of
getting got for information spillage is low, as there are at
present no responsibility components. Forthesereasons,the
issue of information spillage has achieved another
measurement these days.
Not just organizationsare influencedbyinformationspillage;
it is additionally a worry to people. The ascent of
interpersonal organizationsand cell phoneshasexacerbated
things. In these situations, people reveal their own data to
different administration suppliers, ordinarily known as
outsiderapplications,consequentlyforsomeconceivablyfree
administrations. Without legitimate controls furthermore,
responsibility components, a large portion of these
applications impart people's distinguishing data to many
promoting furthermore, Internet following organizations.
Indeed, even with get to control instruments, where
access to delicate information is restricted, a pernicious
approved client can distribute touchy information when he
gets it. Primitives like encryption offer insurance just the
length of the data of intrigue is encoded, yet once the
beneficiary unscrambles a message, nothing can keep him
from distributing the decoded content. In this way it appears
difficult to counteract information spillage proactively. Be
that as it may, as found in the taking after situations the
adequacy of arrangements is sketchy as long as it is
impractical to provably relate theblameworthygatheringsto
the spillages.
We find that the above and other information spillage
situations can be relatedtoa nonattendanceofresponsibility
systems amid information exchanges: leakers either don't
concentrate on insurance, or they deliberately uncover
secret information with noworry,astheyarepersuadedthat
the spilled information can't be connected to them. In
different words, when substances realize that they can be
considered responsible for spillage of some data, they will
exhibit a superior responsibility towards its required
insurance. Now and again, distinguishing proof of the leaker
is made conceivable by scientific strategies, yet these are
typically costly and don't continuously create the craved
outcomes. Consequently, we bring up the requirement for a
general responsibility systemininformation exchanges.This
responsibility can be straightforwardly connected with
provably identifying a transmission history of information
over various elements beginning from its birthplace. This is
known as information provenance, information heredity or
source following. The information provenance technique,as
vigorous watermarking strategies or including fake
information, has as of nowbeenrecommendedinthewriting
and utilized by a few enterprises. Be that as it may, most
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1704
endeavors have been speciallyappointedinnatureandthere
is no formal model accessible. Furthermore, the majority of
these methodologies just permit recognizable proof of the
leaker in a non-provable way, which is not adequate as a
rule.
2. EXISTING SYSTEM
In existing framework, recognizable proof of the leaker is
made conceivable by measurablesystems,howevertheseare
normally costly and don't generally create the wanted
outcomes. Hence, we bring up the requirement for a general
responsibility component in information exchanges. This
responsibility can be straightforwardly connected with
provablydistinguishingatransmissionhistoryofinformation
over various substances beginning from its root. This is
known as information provenance, information ancestry or
source following. The information provenance strategy is
utilizing strong technique including fake information in
inserted message, so that permit of distinguishing proof of
leaker is insufficient to discover leaker.
Disadvantages of Existing System:
1. In interpersonal organizations break of touchy
private data about the clients and their companions
is conceivable even after approach requirement.
2. Data with get to control instrument, where access
to delicate information is restricted, a malevolent
approved outsider can distribute touchy
information after he/she gets information.
3. Repeated mass outsourcing of touchy data with set
of rules implemented can be perniciously
genealogy for money related advantages.
4. A legal system is too expensive for distinguishing
methods.
3. OUR CONTRIBUTIONS
In this venture we characterize LIME technique (Lineage in
Malicious Environment)topersonalitytheliableparty.Inthis
strategy wedole out an obviously characterize administer to
each included gathering and force the between connections
between these parts. Three distinct parts are information
supplier, information buyer (outsider), and examiner. The
information supplier part is to keep up the archives
(images).The information purchaser (outsider) gets the
record and furthermore forward the report to another
outsider.
Reviewer is conjured when aspillageishappens,heisjust
mindful to discover a spillage (blameworthygathering).Heis
summoned by a proprietor and gave the spilled information.
The spilled information was assessed by examiner utilizing
LIME and in this technique, there is distinguishing data
implanted for every customer who got the information.
Undetectable watermarking is done utilizing stenography in
each outsourced picture. Utilizing this data the evaluatorcan
make a genealogy, by cross checking and he discovers the
leaker.
The proposed model of this project isas showninthefigure1
which consists of four main phases as follows,
 Data Upload and Outsource Request.
 Accepting Request and watermarking Method.
 Access Control and Forwarding Data.
 Data Lineage method.
Data Upload and Outsource Request
In this module every association needs to enlist and
transfer a few records like picture,isinchargeofdealingwith
the archives. The customer (outsider) picks the supplier and
gets the supplier's picture list. Purchasers pick the pictures
which one he needs and give the demand to particular
supplier.
4. SYSTEM ARCHITECTURE
Accepting Request and watermarking Method
Wheninformationsupplierloginwithhisqualificationshe
can see thedemandnoticesandcanacknowledgethedemand
or leave as it seems to be. In the wake of tolerating the
demand, then the archives to be send is watermarked. Here
strong watermarking technique is utilized which utilizes
stenographicstrategytoinstallthedata.Theimplanteddata's
are purchasername,suppliernameandfilename.Thesethree
data's are changed to mark utilizing HMAC calculation. The
entire data is scrambled utilizing RSA calculation .The
encoded data is inserted intothepicture.Masswatermarking
is done which is prepared for outsourcing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1705
Access Control and Forwarding Data
Get to Control Mechanism is to limit the buyer to forward the
records that is how frequently the archivescanbeexchanged
to another purchaser (outsider). So client can't forward the
records to numerous outsiders.Afterlimitation,thepictureis
forward to that asked for purchaser. Customer login with his
certifications he/she can see the picture.
Data lineage Method
Get to Control Mechanism is to limit the buyer to forward
the records that is how frequently the archives can be
exchanged to another purchaser (outsider). So client can't
forward the records to numerous outsiders. After limitation,
the picture is forward to that asked for purchaser. Customer
login with his certifications he/she can see the picture.
The reviewer at first takes the proprietor as the flow
presume sends the spilledarchivetotheebbandflowsuspect
and requests that he give thedecodingkeytothewatermarks
in this record. Utilizing the key, reviewer can decode the
report .Thebuyer name is enlisted clientthenthecustomeris
trusted. In the event that client is not enlisted client, the
implanted data length will fluctuate, then evaluator adds the
genealogy in shopper .After cross check between the
presumes a definitive leaker of the picture is recognized.
5. RELATED WORKS
1. Shafi Goldwasser, Silvio Micali And Ronald L. Rivest in
1988. Present a digital signature scheme based on the
computational difficulty of integer factorization. The scheme
possesses the work of fiction property of being healthy
alongside an adaptive chosen-message attack: an adversary
who receives signatures for messages of his choice (where
each message may be chosen in a way that depends on the
autograph of beforehand preferred communication) cannot
afterward create the autograph of even a single additional
message. This may be somewhat surprising, since in the
folklore the possessions ofencompassfalsificationindividual
corresponding to factoring and organism unassailable to an
adaptive chosen-message attack were considered to be
contradictory. More generally, we show how to assemble a
mark system with such belongings bottom on the
continuation of a "claw-free" pair of permutations--a
potentially weaker assumption than the intractability of
numeral factorization. The new method is potentially
practical:signingandverifyingsignaturesarereasonablyfast,
and signatures are compact.
2. Zhiyong Zhang in 2011, Progressive and dynamic
developments in the digital content industry are significantly
dependent on copyright protection. Successful use control
advances can ensure that end purchasers can lawfully get to,
exchange, and share copyrighted substance and relating
computerized rights. From thespecializedandadministrative
points of view, we give a wide review on cutting edge of
Digital Rights Management (DRM) frameworks. This paper
begins with a non specific DRM biological system that
adequately underpins two run of the mill application
situations, and the environment assembles multi-partner
trust and amplifies chance administration openings. And
furthermore, an all encompassing and far reaching
examination of use control models, approaches, and
component were made in detail. These incorporate, yet are
not constrained to, different correlations of rights expression
dialects, security models, approval administration, rights
exchange, and dependable use of secure end-client
computerized gadgets or purchaser hardware.Atlast,ascope
of open issues and difficulties for DRM biological systems are
highlighted. An assortment of controllable and traceable
rights sharing among e-clients, in blend with security hazard
administration, will be the key for rising informal
organization administrations.
3. Emil Praun Hugues Hoppey Adam Finkelstein Princeton,
We describe a robust method for watermarking triangle
meshes. Watermarking gives a component to copyright
assurance of computerized media by implanting data
distinguishing the proprietor in the information. The greater
part of the examination on advanced watermarks has
concentrated on media, for example, pictures, video, sound,
and content. Powerful watermarks must have the capacity to
survive an assortment of "assaults", including resizing,
trimming, and separating. For strength to such assaults, late
watermarking plans utilize a"spread-range" approach– they
change the archive to the recurrence area and annoy the
coefficients of the perceptually most huge premisecapacities.
We extend this spread-range way to deal with work for the
hearty watermarking of discretionary triangle networks.
Summing up spread range methods to surfaces presents two
noteworthy difficulties. To start with, self-assertive surfaces
do not have a characteristic parametrization for recurrence
based decay. Our answer is to build an arrangement of scalar
premise work over theworkverticesutilizingmultiresolution
investigation. The watermark irritates vertices along the
heading of the surface ordinary, weighted by the premise
capacities. The second test is that rearrangements and
different assaults may adjust the network of the work. We
utilize a streamlining procedure to resample an assaulted
work utilizing the first work availability. Comes about
demonstrate that our watermarks are impervious to normal
work operations, for example, interpretation, revolution,
scaling, editing, smoothing, disentanglement,andresampling,
also asmalicious assaults, for example, the addition of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1706
commotion, change of low-request bits, or even inclusion of
different watermarks.
4. David Megı´as, Josep Domingo-Ferrer, Multicast
dissemination of substance is not suited to content-based
electronic business sinceallpurchasersacquiretheverysame
duplicate of the substance, in a manner that unlawful
redistributors can't be followed. Unicast circulation has the
deficiency of requiring one association with every purchaser,
except it permits the vendor to install an alternate serial
number in the duplicate acquired by every purchaser, which
empowers redistributor following. Peer-topeer (P2P)
circulation is a third alternative which may join a portion of
the benefits of multicast and unicast: from one viewpoint, the
vendor just needs unicast associations with a couple seed
purchasers, who assume control over the errand of further
spreading the substance; then again, if a legitimate
fingerprinting component is utilized, unlawful redistributors
of the P2P-dispersed substance can even now be followed. In
this paper, we propose a novel fingerprinting system for P2P
content dissemination which permitsredistributorfollowing,
while saving the security of most legitimate purchasers and
offeringconspiracyresistanceandpurchaserframeproofness.
5. Karen Su, Deepa Kundurand Dimitrios Hatzinakosin2005,
In this paper, we display a hypothetical structure for the
straight intrigue investigation of watermarked advanced
video groupings, and determine another hypothesis
comparing a meaning of factual intangibility, plot resistance,
and two down to earth watermark configuration rules. The
proposed structure is basic and instinctive; the essential
preparing unit is the videoedgeandweconsidersecondorder
measurable portrayals of their worldly between connections.
Inside this expository setup, we characterize the straight
casing conspiracy assault, the scientific idea of a measurably
imperceptiblevideowatermark,anddemonstratethatthelast
is a compelling counterattack against the previous. At long
last, to show how the hypothetical outcomes nitty gritty in
this paper can undoubtedly be connected to the development
of plot safevideo watermarks, weexemplify the investigation
into two pragmatic video watermark configuration decides
that assume a key part in the consequent improvement of a
novel arrangement safe video watermarking calculation
talked about in a partner paper.
Algorithms
 HMAC algorithm
 RSA algorithm
 LIME algorithm
Enhancement
o In this venture we upgraded watermarking utilizing
stenography technique.
o Creating information as a mark utilizing HMAC
calculationand furthermoreencodethe information
utilizing RSA calculation.
o Bulk Outsourcing is to be finished
6. CONCLUSIONS
WeexhibitLIME,amodelforresponsibleinformation
exchange over different substances. We characterize taking
part parties, their interrelationships and give a solid
instantiationforaninformationexchangeconventionutilizing
vigorous watermarking and computerized marks. We
discover leaker in malignant environment utilizing
information heredity strategy.
7. REFERENCES
[1] S. Goldwasser, S.Micali , and R .L. Rivest ,”A digital
signature scheme secure against adaptive chosen-
message attacks,” SIAM J . Comput. , Vol.17.
[2] Emil Praun_Hugues Hoppey Adam Finkelstein Princeton
University,“Robust mesh watermarking ,”IEEETransactions
on multimedia vol.10 Issue 8 Dec-2008.
[3] Karen Su,Deepa Kundur and Dimitrios
Hatzinakos,”Statistical invisibility for collusion resistant
digital video watermarking,”IEEE Transactions on
multimedia,vol.7,No.1,Feb-2005.
[4] A. Mascher-Kampfer, H. St ¨ogner, and A. Uhl, “Multiple
re-watermarking scenarios,” in Proceedings of the 13th
International
Conference on Systems, Signals, andImageProcessing(IWSSIP
2006).
Citeseer, 2006, pp. 53–56.
[5] P. Papadimitriou and H. Garcia-Molina, “Data leakage
detection,”
Knowledge and Data Engineering, IEEE Transactions on, vol.
23, no. 1,
pp. 51–63, 2011.
[6] “Pairing-Based Cryptography Library (PBC),”
http://crypto.stanford.edu/pbc.
[7] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure
spread
spectrum watermarking for multimedia,” Image Processing,
IEEE Transactions on, vol. 6, no. 12, pp. 1673–1687, 1997.
[8] B. Pfitzmann and M. Waidner, “Asymmetric
fingerprinting for larger
collusions,” in Proceedings of the 4th ACM conference on
Computer
and communications security, ser. CCS ’97, 1997, pp. 151–
160.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1707
[9] S. Goldwasser, S. Micali, and R. L. Rivest, “A digital
signature scheme secure against adaptive chosen-message
attacks,” SIAM J. Comput.vol. 17, no. 2, pp. 281–308, 1988.
[10] A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, “A
computational model for watermark robustness,” in
Information Hiding. Springer, 2007, pp. 145–160.
[11] J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon,R.
E. Tarjan, and F. Zane, “Resistance of digital watermarks to
collusive attacks,” in IEEE International Symposium on
Information Theory, 1998, pp. 271–271.
[12] M. Naor and B. Pinkas, “Efficient oblivious transfer
protocols,” in
Proceedings of the Twelfth Annual ACM-SIAM Symposium on
Discrete
Algorithms, 2001, pp. 448–457.
[13] “GNU Multiple Precision Arithmetic Library (GMP),”
http://gmplib.org/.
[14] D. Boneh, B. Lynn, and H. Shacham, “Short signatures
from the Weil pairing,” in AdvancesinCryptology-ASIACRYPT
2001. Springer,
2001, pp. 514–532.
[14] W. Dai, “Crypto++ Library,” http://cryptopp.com.
[15] P. Meerwald, “Watermarking toolbox,”
http://www.cosy.sbg.ac.at/_pmeerw/Watermarking/source.
[16] Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, “Extending
oblivious
transfers efficiently,” in Advances in Cryptology-CRYPTO
2003.
Springer, 2003, pp. 145–161.
[17] M. Backes, N. Grimm, and A. Kate, “Lime: Data lineage in
the
malicious environment,” in Security and Trust Management -
10th
International Workshop, STM 2014, Wroclaw, Poland,
September 10-11,
2014. Proceedings, 2014, pp. 183–187.
[18] R. Hasan, R. Sion, and M. Winslett, “The case of the fake
picasso:
Preventing historyforgery withsecure provenance,”inFAST,
2009, pp.
1–14.
[19] A. Pretschner, M. Hilty, F. Sch¨utz, C. Schaefer, and T.
Walter, “Usage Control Enforcement: Present and Future,”
IEEE Security & Privacy vol. 6, no. 4, pp. 44–53, 2008.
[20] F. Kelbert and A. Pretschner, “Data usage control
enforcement in
distributed systems,” in CODASPY, 2013, pp. 71–82.
[21] F. Salim, N. P. Sheppard, and R. Safavi-Naini, “A Rights
Management Approach to Securing Data Distribution in
Coalitions,” in NSS, 2010, pp. 560–567.
[22] N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona,
“Secure multimedia authoringwithdishonestcollaborators,”
EURASIP J. Appl. Signal Process., vol. 2004, pp. 2214–2223,
2004.
[23] G. S. Poh, “Design and Analysis of Fair Content Tracing
Protocols,”
Ph.D. dissertation, 2009.
R. Petrovic and B. Tehranchi, “Watermarkinginanencrypted
domain,”
Jul. 7 2006, uS Patent App. 11/482,519.
[24] R. Anderson and C. Manifavas, “Chameleon - A newkind
of stream
cipher,” in Fast SoftwareEncryption.Springer,1997,pp.107–
113.
[25] A.-R. Sadeghi, “Secure fingerprinting on sound
foundations,” Ph.D.
dissertation, 2004.
[26] J. Domingo-Ferrer,“Anonymousfingerprinting based on
committed
oblivious transfer,” in Public Key Cryptography. Springer,
1999, pp.
43–52.
[27] A.-R. Sadeghi, “How to break a semi-anonymous
fingerprinting
scheme,” in Information Hiding.Springer,2001,pp.384–394.

More Related Content

What's hot

How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsAndris Soroka
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)James Neo
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingTriskele Labs
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Andris Soroka
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 

What's hot (17)

Defeating Cyber Threats
Defeating Cyber ThreatsDefeating Cyber Threats
Defeating Cyber Threats
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 

Similar to IRJET Secure Multimedia Content Protection and Sharing

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
 
Doctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemDoctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemIRJET Journal
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET Journal
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...IRJET Journal
 

Similar to IRJET Secure Multimedia Content Protection and Sharing (20)

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Doctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemDoctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management System
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

IRJET Secure Multimedia Content Protection and Sharing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1703 Secure Multimedia Content Protection and Sharing Anitha. V1, Priyanka .R2 , Subburam.S3 ,Kapila Vani R.K4 1,2 Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai, India 3 Professor,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai, India 4Assistant Professor, Department of Computer Science and Engineering, Prince Dr. K. Vasudevan College of Engineering and Technology, Chennai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— Deliberate or inadvertent spillage of classified information is without a doubt a standout amongst the most serious security dangers that associations confront in the computerized period. The danger now reaches out to our own lives: a plenty of individual data is accessible to informal communities and cell phone suppliers and is in a roundabout way exchanged to deceitful outsider and fourth meeting relevance. In this occupation, we show a non-detailed in sequence extraction system LIME for information streamover different elements that take two trademark, vital parts (i.e., proprietor and buyer). We characterize the correct security ensures required by such an information ancestry instrument toward distinguishing proof of a liable substance, and recognize the improving non-renouncement and genuineness suspicions. We then create and dissect a novel responsible informationexchangeconventionbetweentwoelementsinside a vindictive domain by expanding upon unaware exchange, vigorous watermarking, and signatureprimitives. Atlonglast, we play out a test assessment to exhibit the common sense of our convention what's more, apply our structuretothecritical information spillagesituationsofinformationoutsourcing and interpersonal organizations. By and large, we consider LIME, our heredity structure for information exchange, to be a key stride towards accomplishing responsibility by plan. Key Words: Cloud storage,public audit,Data integrity,Third Party Auditor (TPA) Data privacy preserving. 1. INTRODUCTION In the advanced time, data spillage through inadvertent exposures, on the other hand deliberate damage by displeased workers and pernicious outer elements, show a standout amongst the most genuine dangers to associations. As indicated by afascinatingorderofinformationbreakskept up by the Privacy Rights Clearinghouse (PRC), in the United States alone, 868, 045, 823 records have been broken from4, 355 information ruptures made open since 2005. It is not hard to trust this is quite recently the tip of the icy mass, as most instances of data spillage go unreported because of dread of loss of client certainty or administrative punishments: it costs organizations by and large $214 per bargained record. Substantial measures of computerized information can be replicated at no cost and can be spread through the web in brief time. Furthermore, the danger of getting got for information spillage is low, as there are at present no responsibility components. Forthesereasons,the issue of information spillage has achieved another measurement these days. Not just organizationsare influencedbyinformationspillage; it is additionally a worry to people. The ascent of interpersonal organizationsand cell phoneshasexacerbated things. In these situations, people reveal their own data to different administration suppliers, ordinarily known as outsiderapplications,consequentlyforsomeconceivablyfree administrations. Without legitimate controls furthermore, responsibility components, a large portion of these applications impart people's distinguishing data to many promoting furthermore, Internet following organizations. Indeed, even with get to control instruments, where access to delicate information is restricted, a pernicious approved client can distribute touchy information when he gets it. Primitives like encryption offer insurance just the length of the data of intrigue is encoded, yet once the beneficiary unscrambles a message, nothing can keep him from distributing the decoded content. In this way it appears difficult to counteract information spillage proactively. Be that as it may, as found in the taking after situations the adequacy of arrangements is sketchy as long as it is impractical to provably relate theblameworthygatheringsto the spillages. We find that the above and other information spillage situations can be relatedtoa nonattendanceofresponsibility systems amid information exchanges: leakers either don't concentrate on insurance, or they deliberately uncover secret information with noworry,astheyarepersuadedthat the spilled information can't be connected to them. In different words, when substances realize that they can be considered responsible for spillage of some data, they will exhibit a superior responsibility towards its required insurance. Now and again, distinguishing proof of the leaker is made conceivable by scientific strategies, yet these are typically costly and don't continuously create the craved outcomes. Consequently, we bring up the requirement for a general responsibility systemininformation exchanges.This responsibility can be straightforwardly connected with provably identifying a transmission history of information over various elements beginning from its birthplace. This is known as information provenance, information heredity or source following. The information provenance technique,as vigorous watermarking strategies or including fake information, has as of nowbeenrecommendedinthewriting and utilized by a few enterprises. Be that as it may, most
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1704 endeavors have been speciallyappointedinnatureandthere is no formal model accessible. Furthermore, the majority of these methodologies just permit recognizable proof of the leaker in a non-provable way, which is not adequate as a rule. 2. EXISTING SYSTEM In existing framework, recognizable proof of the leaker is made conceivable by measurablesystems,howevertheseare normally costly and don't generally create the wanted outcomes. Hence, we bring up the requirement for a general responsibility component in information exchanges. This responsibility can be straightforwardly connected with provablydistinguishingatransmissionhistoryofinformation over various substances beginning from its root. This is known as information provenance, information ancestry or source following. The information provenance strategy is utilizing strong technique including fake information in inserted message, so that permit of distinguishing proof of leaker is insufficient to discover leaker. Disadvantages of Existing System: 1. In interpersonal organizations break of touchy private data about the clients and their companions is conceivable even after approach requirement. 2. Data with get to control instrument, where access to delicate information is restricted, a malevolent approved outsider can distribute touchy information after he/she gets information. 3. Repeated mass outsourcing of touchy data with set of rules implemented can be perniciously genealogy for money related advantages. 4. A legal system is too expensive for distinguishing methods. 3. OUR CONTRIBUTIONS In this venture we characterize LIME technique (Lineage in Malicious Environment)topersonalitytheliableparty.Inthis strategy wedole out an obviously characterize administer to each included gathering and force the between connections between these parts. Three distinct parts are information supplier, information buyer (outsider), and examiner. The information supplier part is to keep up the archives (images).The information purchaser (outsider) gets the record and furthermore forward the report to another outsider. Reviewer is conjured when aspillageishappens,heisjust mindful to discover a spillage (blameworthygathering).Heis summoned by a proprietor and gave the spilled information. The spilled information was assessed by examiner utilizing LIME and in this technique, there is distinguishing data implanted for every customer who got the information. Undetectable watermarking is done utilizing stenography in each outsourced picture. Utilizing this data the evaluatorcan make a genealogy, by cross checking and he discovers the leaker. The proposed model of this project isas showninthefigure1 which consists of four main phases as follows,  Data Upload and Outsource Request.  Accepting Request and watermarking Method.  Access Control and Forwarding Data.  Data Lineage method. Data Upload and Outsource Request In this module every association needs to enlist and transfer a few records like picture,isinchargeofdealingwith the archives. The customer (outsider) picks the supplier and gets the supplier's picture list. Purchasers pick the pictures which one he needs and give the demand to particular supplier. 4. SYSTEM ARCHITECTURE Accepting Request and watermarking Method Wheninformationsupplierloginwithhisqualificationshe can see thedemandnoticesandcanacknowledgethedemand or leave as it seems to be. In the wake of tolerating the demand, then the archives to be send is watermarked. Here strong watermarking technique is utilized which utilizes stenographicstrategytoinstallthedata.Theimplanteddata's are purchasername,suppliernameandfilename.Thesethree data's are changed to mark utilizing HMAC calculation. The entire data is scrambled utilizing RSA calculation .The encoded data is inserted intothepicture.Masswatermarking is done which is prepared for outsourcing.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1705 Access Control and Forwarding Data Get to Control Mechanism is to limit the buyer to forward the records that is how frequently the archivescanbeexchanged to another purchaser (outsider). So client can't forward the records to numerous outsiders.Afterlimitation,thepictureis forward to that asked for purchaser. Customer login with his certifications he/she can see the picture. Data lineage Method Get to Control Mechanism is to limit the buyer to forward the records that is how frequently the archives can be exchanged to another purchaser (outsider). So client can't forward the records to numerous outsiders. After limitation, the picture is forward to that asked for purchaser. Customer login with his certifications he/she can see the picture. The reviewer at first takes the proprietor as the flow presume sends the spilledarchivetotheebbandflowsuspect and requests that he give thedecodingkeytothewatermarks in this record. Utilizing the key, reviewer can decode the report .Thebuyer name is enlisted clientthenthecustomeris trusted. In the event that client is not enlisted client, the implanted data length will fluctuate, then evaluator adds the genealogy in shopper .After cross check between the presumes a definitive leaker of the picture is recognized. 5. RELATED WORKS 1. Shafi Goldwasser, Silvio Micali And Ronald L. Rivest in 1988. Present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the work of fiction property of being healthy alongside an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the autograph of beforehand preferred communication) cannot afterward create the autograph of even a single additional message. This may be somewhat surprising, since in the folklore the possessions ofencompassfalsificationindividual corresponding to factoring and organism unassailable to an adaptive chosen-message attack were considered to be contradictory. More generally, we show how to assemble a mark system with such belongings bottom on the continuation of a "claw-free" pair of permutations--a potentially weaker assumption than the intractability of numeral factorization. The new method is potentially practical:signingandverifyingsignaturesarereasonablyfast, and signatures are compact. 2. Zhiyong Zhang in 2011, Progressive and dynamic developments in the digital content industry are significantly dependent on copyright protection. Successful use control advances can ensure that end purchasers can lawfully get to, exchange, and share copyrighted substance and relating computerized rights. From thespecializedandadministrative points of view, we give a wide review on cutting edge of Digital Rights Management (DRM) frameworks. This paper begins with a non specific DRM biological system that adequately underpins two run of the mill application situations, and the environment assembles multi-partner trust and amplifies chance administration openings. And furthermore, an all encompassing and far reaching examination of use control models, approaches, and component were made in detail. These incorporate, yet are not constrained to, different correlations of rights expression dialects, security models, approval administration, rights exchange, and dependable use of secure end-client computerized gadgets or purchaser hardware.Atlast,ascope of open issues and difficulties for DRM biological systems are highlighted. An assortment of controllable and traceable rights sharing among e-clients, in blend with security hazard administration, will be the key for rising informal organization administrations. 3. Emil Praun Hugues Hoppey Adam Finkelstein Princeton, We describe a robust method for watermarking triangle meshes. Watermarking gives a component to copyright assurance of computerized media by implanting data distinguishing the proprietor in the information. The greater part of the examination on advanced watermarks has concentrated on media, for example, pictures, video, sound, and content. Powerful watermarks must have the capacity to survive an assortment of "assaults", including resizing, trimming, and separating. For strength to such assaults, late watermarking plans utilize a"spread-range" approach– they change the archive to the recurrence area and annoy the coefficients of the perceptually most huge premisecapacities. We extend this spread-range way to deal with work for the hearty watermarking of discretionary triangle networks. Summing up spread range methods to surfaces presents two noteworthy difficulties. To start with, self-assertive surfaces do not have a characteristic parametrization for recurrence based decay. Our answer is to build an arrangement of scalar premise work over theworkverticesutilizingmultiresolution investigation. The watermark irritates vertices along the heading of the surface ordinary, weighted by the premise capacities. The second test is that rearrangements and different assaults may adjust the network of the work. We utilize a streamlining procedure to resample an assaulted work utilizing the first work availability. Comes about demonstrate that our watermarks are impervious to normal work operations, for example, interpretation, revolution, scaling, editing, smoothing, disentanglement,andresampling, also asmalicious assaults, for example, the addition of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1706 commotion, change of low-request bits, or even inclusion of different watermarks. 4. David Megı´as, Josep Domingo-Ferrer, Multicast dissemination of substance is not suited to content-based electronic business sinceallpurchasersacquiretheverysame duplicate of the substance, in a manner that unlawful redistributors can't be followed. Unicast circulation has the deficiency of requiring one association with every purchaser, except it permits the vendor to install an alternate serial number in the duplicate acquired by every purchaser, which empowers redistributor following. Peer-topeer (P2P) circulation is a third alternative which may join a portion of the benefits of multicast and unicast: from one viewpoint, the vendor just needs unicast associations with a couple seed purchasers, who assume control over the errand of further spreading the substance; then again, if a legitimate fingerprinting component is utilized, unlawful redistributors of the P2P-dispersed substance can even now be followed. In this paper, we propose a novel fingerprinting system for P2P content dissemination which permitsredistributorfollowing, while saving the security of most legitimate purchasers and offeringconspiracyresistanceandpurchaserframeproofness. 5. Karen Su, Deepa Kundurand Dimitrios Hatzinakosin2005, In this paper, we display a hypothetical structure for the straight intrigue investigation of watermarked advanced video groupings, and determine another hypothesis comparing a meaning of factual intangibility, plot resistance, and two down to earth watermark configuration rules. The proposed structure is basic and instinctive; the essential preparing unit is the videoedgeandweconsidersecondorder measurable portrayals of their worldly between connections. Inside this expository setup, we characterize the straight casing conspiracy assault, the scientific idea of a measurably imperceptiblevideowatermark,anddemonstratethatthelast is a compelling counterattack against the previous. At long last, to show how the hypothetical outcomes nitty gritty in this paper can undoubtedly be connected to the development of plot safevideo watermarks, weexemplify the investigation into two pragmatic video watermark configuration decides that assume a key part in the consequent improvement of a novel arrangement safe video watermarking calculation talked about in a partner paper. Algorithms  HMAC algorithm  RSA algorithm  LIME algorithm Enhancement o In this venture we upgraded watermarking utilizing stenography technique. o Creating information as a mark utilizing HMAC calculationand furthermoreencodethe information utilizing RSA calculation. o Bulk Outsourcing is to be finished 6. CONCLUSIONS WeexhibitLIME,amodelforresponsibleinformation exchange over different substances. We characterize taking part parties, their interrelationships and give a solid instantiationforaninformationexchangeconventionutilizing vigorous watermarking and computerized marks. We discover leaker in malignant environment utilizing information heredity strategy. 7. REFERENCES [1] S. Goldwasser, S.Micali , and R .L. Rivest ,”A digital signature scheme secure against adaptive chosen- message attacks,” SIAM J . Comput. , Vol.17. [2] Emil Praun_Hugues Hoppey Adam Finkelstein Princeton University,“Robust mesh watermarking ,”IEEETransactions on multimedia vol.10 Issue 8 Dec-2008. [3] Karen Su,Deepa Kundur and Dimitrios Hatzinakos,”Statistical invisibility for collusion resistant digital video watermarking,”IEEE Transactions on multimedia,vol.7,No.1,Feb-2005. [4] A. Mascher-Kampfer, H. St ¨ogner, and A. Uhl, “Multiple re-watermarking scenarios,” in Proceedings of the 13th International Conference on Systems, Signals, andImageProcessing(IWSSIP 2006). Citeseer, 2006, pp. 53–56. [5] P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 1, pp. 51–63, 2011. [6] “Pairing-Based Cryptography Library (PBC),” http://crypto.stanford.edu/pbc. [7] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” Image Processing, IEEE Transactions on, vol. 6, no. 12, pp. 1673–1687, 1997. [8] B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” in Proceedings of the 4th ACM conference on Computer and communications security, ser. CCS ’97, 1997, pp. 151– 160.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1707 [9] S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM J. Comput.vol. 17, no. 2, pp. 281–308, 1988. [10] A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, “A computational model for watermark robustness,” in Information Hiding. Springer, 2007, pp. 145–160. [11] J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon,R. E. Tarjan, and F. Zane, “Resistance of digital watermarks to collusive attacks,” in IEEE International Symposium on Information Theory, 1998, pp. 271–271. [12] M. Naor and B. Pinkas, “Efficient oblivious transfer protocols,” in Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, 2001, pp. 448–457. [13] “GNU Multiple Precision Arithmetic Library (GMP),” http://gmplib.org/. [14] D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” in AdvancesinCryptology-ASIACRYPT 2001. Springer, 2001, pp. 514–532. [14] W. Dai, “Crypto++ Library,” http://cryptopp.com. [15] P. Meerwald, “Watermarking toolbox,” http://www.cosy.sbg.ac.at/_pmeerw/Watermarking/source. [16] Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, “Extending oblivious transfers efficiently,” in Advances in Cryptology-CRYPTO 2003. Springer, 2003, pp. 145–161. [17] M. Backes, N. Grimm, and A. Kate, “Lime: Data lineage in the malicious environment,” in Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings, 2014, pp. 183–187. [18] R. Hasan, R. Sion, and M. Winslett, “The case of the fake picasso: Preventing historyforgery withsecure provenance,”inFAST, 2009, pp. 1–14. [19] A. Pretschner, M. Hilty, F. Sch¨utz, C. Schaefer, and T. Walter, “Usage Control Enforcement: Present and Future,” IEEE Security & Privacy vol. 6, no. 4, pp. 44–53, 2008. [20] F. Kelbert and A. Pretschner, “Data usage control enforcement in distributed systems,” in CODASPY, 2013, pp. 71–82. [21] F. Salim, N. P. Sheppard, and R. Safavi-Naini, “A Rights Management Approach to Securing Data Distribution in Coalitions,” in NSS, 2010, pp. 560–567. [22] N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona, “Secure multimedia authoringwithdishonestcollaborators,” EURASIP J. Appl. Signal Process., vol. 2004, pp. 2214–2223, 2004. [23] G. S. Poh, “Design and Analysis of Fair Content Tracing Protocols,” Ph.D. dissertation, 2009. R. Petrovic and B. Tehranchi, “Watermarkinginanencrypted domain,” Jul. 7 2006, uS Patent App. 11/482,519. [24] R. Anderson and C. Manifavas, “Chameleon - A newkind of stream cipher,” in Fast SoftwareEncryption.Springer,1997,pp.107– 113. [25] A.-R. Sadeghi, “Secure fingerprinting on sound foundations,” Ph.D. dissertation, 2004. [26] J. Domingo-Ferrer,“Anonymousfingerprinting based on committed oblivious transfer,” in Public Key Cryptography. Springer, 1999, pp. 43–52. [27] A.-R. Sadeghi, “How to break a semi-anonymous fingerprinting scheme,” in Information Hiding.Springer,2001,pp.384–394.