SlideShare a Scribd company logo
International Journal of Modern Trends in Engineering and
Research
www.ijmter.com
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 37
Enhanced Dynamic Leakage Detection and Piracy Prevention in
Content Delivery Networks
J.Joslin Iyda1
, R.ThangamalarAnitha2
1
Information Technology, Rajalakshmi Engineering College
2
Information Technology, Rajalakshmi Engineering College
Abstract -- Due to the increasing popularity of video services application in recent days, it is
undesirable to prevent the content leakage on the trusted video delivery and piracy prevention has
been indeed, become critical. In order to preserve content leakage and prevent piracy,
conventional system addressed the issue by proposing the method based on the observation of
streamed traffic throughout the network .Also piracy has hindered the use of open peer to peer
networks for commercial content delivery. Hence the basic idea is to propose an enhanced
dynamic content leakage detection scheme that is robust to the variation of the video lengths. It
enhances the detection performances even in the environment subjected to variation in length of
videos. To detect pirates, identity-based signature and time stamped token have been generated. It
helps to solve piracy without affecting P2P clients so that colluder cannot download the secured
videos. The advantage lies mainly in advanced content availability, low cost and copyright
agreements in protecting the secured videos.
Keywords -- Content Delivery Networks, Content Leakage Detection, Streamed Traffic, Piracy,
Digital Signature.
I. INTRODUCTION
In recent years, popularity of real-time video and streaming application and services over
the internet has increased. Examples: YouTube, Microsoft Network Videos. Most people do not
read as much as they used to, and when they do read, they tend to skim-read, which means the
importance of written copy can be lost or misinterpreted[7].With an abundance of content pushed
to consumers and employees every day, a well-crafted video allows brand or message to stand
out and be clearly understood. The three basic reasons to use video: cost-effectiveness, increased
productivity and consistency [8].
The main uses of videos [9] include Training and Tutorial, where corporate video first
gained prominence with training (service, support, sales, personal development etc.) and
continues to be one of the best uses of video. Online Video is a cost effective substitute for in-
class training. It can also easily integrate video into online training management tools. Share the
knowledge gained at these events by capturing the presentations, demos, interviews,
commentaries etc. on video. Product Demonstrations help to show how product works and
highlight the features that differentiate it from those other competitors. Software screen captures,
3D cut-away, or a high impact demo by a presenter are all excellent ways of showing how
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 38
product or service works. Infomercials have been around forever. While they continue to be the
primary focus of web-based parody videos they have remained remarkably resilient over time.
The shopping channel is, in effect, a 24 hour infomercial. If done well, Infomercials can be very
effective at selling certain consumer products.
II. RELATED WORK
In computing, a shared resource, or network share, is a computer resource made available
from one host to other hosts on a computer network. Some examples of shareable resources are
computer programs, data, storage devices, and printers. Network sharing is made possible by
inter-process communication over the network.
Shared resources, also known as network resources, refer to computer data, information,
or hardware devices that can be easily accessed from a remote computer through a local area
network (LAN) or enterprise intranet. Successful shared resource access allows users to operate
as if the shared resource were on their own computer. The most frequently used shared network
environment objects are files, data, multimedia and hardware resources like printers, fax
machines and scanners[10].
The videos with collusive piracy is the main source of intellectual property violations
within the boundary of a P2P network. Paid clients may illegally share copyrighted content files
with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for
commercial content delivery. It propose a proactive content poisoning scheme to stop colluders
and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect
pirates timely with identity-based signatures and time stamped tokens. The scheme stops
collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected
violators, exclusively[1].
Cisco Data Loss Prevention (DLP) is a data leakage protection solution that helps
organizations assess risk and prevent data loss over the highest points of risk. It safeguards
proprietary information against security threats due to enhanced employee mobility, new
communication channels, and diverse services.
To solve the issues of content leakage, leakage detection scheme have been introduced.
It helps to investigate the performance of the proposed method under a real network
environment with videos of different lengths. The proposed method allows flexible and accurate
streaming content leakage detection independent of the length of the streaming content, which
enhances secured and trusted content delivery[2].
Video streaming application[3] deals with several P2P network is used to build live and
online video streaming services on the internet at low cost. Provide large scale live and on-
demand videos streaming services. The limitation is that no good quality of videos. Videos
playback start tens of second after a user selects a channels.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 39
In order to detect illegal content streaming by using traffic pattern which are constructed
from the amount of traffic routers. To solve burst errors and random errors. It prevent content
leakage from user‘s side. However delay occur due to large length of videos[4].
As an extensible signaling protocol, SIP (Session Initiation Protocol) can be applied in
developing video conference system of conference server and the availability of bandwidth. It
focuses on how to keep conferencing when the number of conference users increases. It
provides a scalable service model for SIP-based video conference. The main disadvantage is
Cost Expensive, Low resolution[5].
IPSec VPNs is developed to implement Internet security connection using Virtual Private
Network. It helps in performing of video conference in real time multi-media traffic and secure
connection links. Quality of video will be good. However due to heavy network, traffic loads.
Encryption require high amount of CPU and memory [6].
Thus from the above it is concluded that content leakage and piracy prevention is a major
issues. Hence it is proposed to recover content leakage and piracy for the trusted videos.
III. FRAMEWORK
In the framework, overall process of the design is being explained. The owner or
distributor uploads the compressed video in the server. He uploads the copyright videos
containing token, digital signature. Then the user is one who downloads the video. While he
downloads the video, he needs to send request to server containing token, timestamp, signature
.After the token and signature is being verified, the user can download that video in a
compressed format. If the token or signature is not same, the videos can’t be downloaded. Thus
the piracy of video is prevented.
When user uploads many videos in the server, content is being leaked due to the traffic of
network. It can be identified based on the length of the video. Also when many users download
the particular video, content is being leaked. So that the user can’t download the entire complete
video. It should be avoided by leakage detection process. When leakage detection algorithm is
being applied, content leakage is recovered. Thus the content leakage due to traffic of network
can be avoided.
The overall architecture diagram for the content leakage and piracy prevention is given
below.
The methodology of the proposed framework is based on the following module.
1. Video Compression
2. Piracy Prevention
3. Content Leakage Detection
4. Content Leakage Recovery
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 40
Figure 1. Framework for Content Leakage and Piracy Prevention
Distributor
Uploading Videos
(Compressed)
Downloading
Videos
(compressed)
Digital Signature
User
Interrupt
Service
Routine
Piracy
prevented
Content Leakage
Leakage
Detection
Process
Token
Generation
PAP
Videos
Content Leakage
Recovered
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 41
The Dataflow diagram for the overall framework is given below.
Figure 2. Dataflow Diagram for Overall Design
3.1 VIDEO COMPRESSION
Video is being compressed by arithmetic length encoding. The original videos are framed
into 8 * 8 blocks. Then the blocks are segmented based on discrete cosine transform. By
applying quantization videos is being compressed. To decompress the videos, inverse the
Distributor
Compressin
g Videos
Decompres
sing Videos
Content
Leakage
Detection
Decrypting
Videos
Leakage
Recovery
Encrypting
Videos
Piracy
Preventing
User
Videos
Uploading Piracy
Checking
Downloading
Checking
Content
Leakage
Checking
Content
Leakage
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 42
discrete cosine transforms. Apply quantization. With the help of decompressed algorithm such as
arithmetic length decoding, original video can be obtained.
3.2 DIGITAL SIGNATURE
Pseudo code:
Token Generation
Input: Digital Receipt
Output: Encrypted Authorization Token T
If Receipt is invalid
Deny the request;
Else
λ= Decrypt (Receipt);
P = Observe (Requestor)
K = privatekeyRequest(p);
Token T = Ownersign(f,p,ts);
Reply = { k,p,Ts, t}
SendToRequestor{ Encrypt(Reply)}
Endif
Digital signature is used to maintain piracy prevention in authorized content. First, both
distributor and user are fully trusted. Their public keys are known to all videos. The piracy
prevention consists of two integral parts: token generation and authorization verification. All
videos are encrypted using the session key assigned by the transaction server at purchase time.
A token is a digital signature of a three tuple :{ endpoint, file ID, timestamp} signed by
the private key of the content owner. Since bootstrap agent has a copy of the digital receipt sent
by transaction server, verifying the receipt is thus done locally. The Decrypt (Receipt) function
decrypts the digital receipt to identify the file .The Observe (requestor) returns with the
endpoint address.
3.2.1 Piracy Prevention
Peer Authorization Protocol
Input : T = Token, ts= timestamp, S = Peer signature
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 43
Φ(λ,p)=file index for file at end point p
Output: Peer authorization status
True – Authorization granted
False – Authorization Denied
The Owner Sign function returns with a token. Upon receiving a private key, the
bootstrap agent digitally signs the file ID, endpoint address, and timestamp to create the token.
The reply message contains a four tuple :{ endpoint address, private key, timestamp, token}.
After token is being generated, user send request to download a video. A download
request include a token, file index, timestamp, and the digital signature. If any of the fields are
missing, the download is stopped. A download user must have a valid token T and signature S.
Two pieces of critical information are needed: public key and the endpoint address. It verifies
both token T and signature S. Token also contains the file index information and timestamp
indicating the expiration time of the token. The Parse (input) extracts timestamp, token,
signature, and index from a download request.
3.3 CONTENT LEAKAGE
Due to upload of n number of videos, distributor finds content leakage in the network.
Also when user downloads video from the server, the heavy traffic in network arises. It leads to
packet loss, jitter and time delay. It leads to content leakage in downloading the videos. Hence it
is necessary to solve content leakage.
Throughout the video streaming process, the changes of the amount of traffic appear as a
unique waveform specifies to the content. Thus by getting this information retrieved in the
network, the content leakage can be detected. Pattern generation algorithm is used to match the
video from user‘s side and server ‘s side. Based on the time slot , the content leakage can be
detected. By applying pattern matching algorithm, content leakage can be recovered.
3.4 CONTENT LEAKAGE RECOVERY
Content can be recovered by determination of the decision threshold for detecting
leakage. The steps of content recovery are as follows.
1. Threshold determination process
2. Comparison based on traffic pattern
3. Cost evaluation
In threshold determination, from the original video a portion of video being taken and
generate the corresponding traffic pattern. These patterns are compared with the original traffic
pattern to perform sampling of the length of the videos. Then the curve is being generated from
the observed traffic pattern. It is necessary to compare the adjusted degree of similarity to the
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 04, [October - 2014]
e-ISSN: 2349-9745
p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 44
decision threshold to the original video and recover the leakage. Then the cost is being evaluated
for the above process.
VI. CONCLUSION AND FUTURE WORKS
The content leakage of video is being detected and piracy prevention has been proposed
for the compressed videos. In future it may be enhanced to detect content leakage for online
video conferencing.
REFERENCES
[1] Xiaosong Lou, Kai Hwang, “Collusive Piracy Prevention in P2P Content Delivery
Networks” IEEE TRANSACTION ON COMPUTERS, VOL 58, NO. 7,JULY 2009.
[2] Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, and NeiKato,"Traffic Pattern
Based Content Leakage Detection for Trusted Content Delivery Networks," IEEE
Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 301-309, Feb. 2014.
[3] Y. Liu, Y. Guo, and C. Liang, “A survey on peer-to-peer video streaming systems,”Peer-to-
Peer Networking and Applications, Vol.1, No.1, pp.18- 28, Mar. 2008.
[4]M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor Tracing
Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless
Environments,” in Proc. IEEE Global Telecommunications Conference, pp.1-5, San Francisco,
USA, Nov./Dec. 2006.
[5]Z. Yang, H. Ma, and J. Zhang, “A dynamic scalable service model for SIP-based video
conference,” in Proc. 9th International Conference on Computer Supported Cooperative Work in
DE.
[6]O. Adeyinka, “Analysis of IPSec VPNs Performance in A Multimedia Environment,” School
of Computing and Technology, University of East London.
[7]http://www.lunarpages.com/uptime/importance-videos-business
[8]http://goanimate.com/video-makertips/why-video-marketing-important
[9]http://www.onemarketmedia.com/2011/01/03/51-ways-to-use-web-video-to-help-your-
business-grow/
[10]http:/en.wikipedia.org/wiki/Shared_resouce
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery Networks
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery Networks

More Related Content

What's hot

Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Security B-Sides
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
authority12
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
Djadja Sardjana
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
L41 slides
L41 slidesL41 slides
L41 slides
Ann Bentley
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
Peter de Bruijn
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
itforum-roundtable
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
Luc Beirens
 
News letter oct 12
News letter oct 12News letter oct 12
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
AirTight Networks
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
 
OMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised SubmissionOMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised Submission
Gerardo Pardo-Castellote
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
Zsolt Nemeth
 
Development of a Multi-eID access control system.
Development of a Multi-eID access control system.   Development of a Multi-eID access control system.
Development of a Multi-eID access control system.
ePractice.eu
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
Zsolt Nemeth
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
legalservices
 

What's hot (20)

Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
L41 slides
L41 slidesL41 slides
L41 slides
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
News letter oct 12
News letter oct 12News letter oct 12
News letter oct 12
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
OMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised SubmissionOMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised Submission
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Development of a Multi-eID access control system.
Development of a Multi-eID access control system.   Development of a Multi-eID access control system.
Development of a Multi-eID access control system.
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 

Similar to Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery Networks

VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...
cscpconf
 
Videoconferencing web
Videoconferencing webVideoconferencing web
Videoconferencing web
csandit
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
Journal For Research
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
Iftikhar Ahmad
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
IJRAT
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
IJARBEST JOURNAL
 
Video Streaming across wide area networks
Video Streaming across wide area networksVideo Streaming across wide area networks
Video Streaming across wide area networks
Videoguy
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance System
IRJET Journal
 
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video ConferencingReal Time Head Generation for Video Conferencing
Real Time Head Generation for Video Conferencing
IRJET Journal
 
Ijcatr04061005
Ijcatr04061005Ijcatr04061005
Ijcatr04061005
Editor IJCATR
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud?
ijcisjournal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
System Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingSystem Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video Conferencing
Videoguy
 
T7L4.doc.doc
T7L4.doc.docT7L4.doc.doc
T7L4.doc.doc
Videoguy
 
Cloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection SystemCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System
1crore projects
 
minor-project-1.ppt
minor-project-1.pptminor-project-1.ppt
minor-project-1.ppt
thinkonce1
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
ijtsrd
 
Thesis topics in networking
Thesis topics in networkingThesis topics in networking
Thesis topics in networking
Rudi Arif candra
 
journal in research
journal in research journal in research
journal in research
graphicdesigner79
 

Similar to Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery Networks (20)

VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...
 
Videoconferencing web
Videoconferencing webVideoconferencing web
Videoconferencing web
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Video Streaming across wide area networks
Video Streaming across wide area networksVideo Streaming across wide area networks
Video Streaming across wide area networks
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance System
 
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video ConferencingReal Time Head Generation for Video Conferencing
Real Time Head Generation for Video Conferencing
 
Ijcatr04061005
Ijcatr04061005Ijcatr04061005
Ijcatr04061005
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud?
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
System Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingSystem Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video Conferencing
 
T7L4.doc.doc
T7L4.doc.docT7L4.doc.doc
T7L4.doc.doc
 
Cloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection SystemCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System
 
minor-project-1.ppt
minor-project-1.pptminor-project-1.ppt
minor-project-1.ppt
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
 
Thesis topics in networking
Thesis topics in networkingThesis topics in networking
Thesis topics in networking
 
journal in research
journal in research journal in research
journal in research
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 

Recently uploaded (20)

sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 

Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery Networks

  • 1. International Journal of Modern Trends in Engineering and Research www.ijmter.com e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 37 Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery Networks J.Joslin Iyda1 , R.ThangamalarAnitha2 1 Information Technology, Rajalakshmi Engineering College 2 Information Technology, Rajalakshmi Engineering College Abstract -- Due to the increasing popularity of video services application in recent days, it is undesirable to prevent the content leakage on the trusted video delivery and piracy prevention has been indeed, become critical. In order to preserve content leakage and prevent piracy, conventional system addressed the issue by proposing the method based on the observation of streamed traffic throughout the network .Also piracy has hindered the use of open peer to peer networks for commercial content delivery. Hence the basic idea is to propose an enhanced dynamic content leakage detection scheme that is robust to the variation of the video lengths. It enhances the detection performances even in the environment subjected to variation in length of videos. To detect pirates, identity-based signature and time stamped token have been generated. It helps to solve piracy without affecting P2P clients so that colluder cannot download the secured videos. The advantage lies mainly in advanced content availability, low cost and copyright agreements in protecting the secured videos. Keywords -- Content Delivery Networks, Content Leakage Detection, Streamed Traffic, Piracy, Digital Signature. I. INTRODUCTION In recent years, popularity of real-time video and streaming application and services over the internet has increased. Examples: YouTube, Microsoft Network Videos. Most people do not read as much as they used to, and when they do read, they tend to skim-read, which means the importance of written copy can be lost or misinterpreted[7].With an abundance of content pushed to consumers and employees every day, a well-crafted video allows brand or message to stand out and be clearly understood. The three basic reasons to use video: cost-effectiveness, increased productivity and consistency [8]. The main uses of videos [9] include Training and Tutorial, where corporate video first gained prominence with training (service, support, sales, personal development etc.) and continues to be one of the best uses of video. Online Video is a cost effective substitute for in- class training. It can also easily integrate video into online training management tools. Share the knowledge gained at these events by capturing the presentations, demos, interviews, commentaries etc. on video. Product Demonstrations help to show how product works and highlight the features that differentiate it from those other competitors. Software screen captures, 3D cut-away, or a high impact demo by a presenter are all excellent ways of showing how
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 38 product or service works. Infomercials have been around forever. While they continue to be the primary focus of web-based parody videos they have remained remarkably resilient over time. The shopping channel is, in effect, a 24 hour infomercial. If done well, Infomercials can be very effective at selling certain consumer products. II. RELATED WORK In computing, a shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network. Some examples of shareable resources are computer programs, data, storage devices, and printers. Network sharing is made possible by inter-process communication over the network. Shared resources, also known as network resources, refer to computer data, information, or hardware devices that can be easily accessed from a remote computer through a local area network (LAN) or enterprise intranet. Successful shared resource access allows users to operate as if the shared resource were on their own computer. The most frequently used shared network environment objects are files, data, multimedia and hardware resources like printers, fax machines and scanners[10]. The videos with collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. It propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively[1]. Cisco Data Loss Prevention (DLP) is a data leakage protection solution that helps organizations assess risk and prevent data loss over the highest points of risk. It safeguards proprietary information against security threats due to enhanced employee mobility, new communication channels, and diverse services. To solve the issues of content leakage, leakage detection scheme have been introduced. It helps to investigate the performance of the proposed method under a real network environment with videos of different lengths. The proposed method allows flexible and accurate streaming content leakage detection independent of the length of the streaming content, which enhances secured and trusted content delivery[2]. Video streaming application[3] deals with several P2P network is used to build live and online video streaming services on the internet at low cost. Provide large scale live and on- demand videos streaming services. The limitation is that no good quality of videos. Videos playback start tens of second after a user selects a channels.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 39 In order to detect illegal content streaming by using traffic pattern which are constructed from the amount of traffic routers. To solve burst errors and random errors. It prevent content leakage from user‘s side. However delay occur due to large length of videos[4]. As an extensible signaling protocol, SIP (Session Initiation Protocol) can be applied in developing video conference system of conference server and the availability of bandwidth. It focuses on how to keep conferencing when the number of conference users increases. It provides a scalable service model for SIP-based video conference. The main disadvantage is Cost Expensive, Low resolution[5]. IPSec VPNs is developed to implement Internet security connection using Virtual Private Network. It helps in performing of video conference in real time multi-media traffic and secure connection links. Quality of video will be good. However due to heavy network, traffic loads. Encryption require high amount of CPU and memory [6]. Thus from the above it is concluded that content leakage and piracy prevention is a major issues. Hence it is proposed to recover content leakage and piracy for the trusted videos. III. FRAMEWORK In the framework, overall process of the design is being explained. The owner or distributor uploads the compressed video in the server. He uploads the copyright videos containing token, digital signature. Then the user is one who downloads the video. While he downloads the video, he needs to send request to server containing token, timestamp, signature .After the token and signature is being verified, the user can download that video in a compressed format. If the token or signature is not same, the videos can’t be downloaded. Thus the piracy of video is prevented. When user uploads many videos in the server, content is being leaked due to the traffic of network. It can be identified based on the length of the video. Also when many users download the particular video, content is being leaked. So that the user can’t download the entire complete video. It should be avoided by leakage detection process. When leakage detection algorithm is being applied, content leakage is recovered. Thus the content leakage due to traffic of network can be avoided. The overall architecture diagram for the content leakage and piracy prevention is given below. The methodology of the proposed framework is based on the following module. 1. Video Compression 2. Piracy Prevention 3. Content Leakage Detection 4. Content Leakage Recovery
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 40 Figure 1. Framework for Content Leakage and Piracy Prevention Distributor Uploading Videos (Compressed) Downloading Videos (compressed) Digital Signature User Interrupt Service Routine Piracy prevented Content Leakage Leakage Detection Process Token Generation PAP Videos Content Leakage Recovered
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 41 The Dataflow diagram for the overall framework is given below. Figure 2. Dataflow Diagram for Overall Design 3.1 VIDEO COMPRESSION Video is being compressed by arithmetic length encoding. The original videos are framed into 8 * 8 blocks. Then the blocks are segmented based on discrete cosine transform. By applying quantization videos is being compressed. To decompress the videos, inverse the Distributor Compressin g Videos Decompres sing Videos Content Leakage Detection Decrypting Videos Leakage Recovery Encrypting Videos Piracy Preventing User Videos Uploading Piracy Checking Downloading Checking Content Leakage Checking Content Leakage
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 42 discrete cosine transforms. Apply quantization. With the help of decompressed algorithm such as arithmetic length decoding, original video can be obtained. 3.2 DIGITAL SIGNATURE Pseudo code: Token Generation Input: Digital Receipt Output: Encrypted Authorization Token T If Receipt is invalid Deny the request; Else λ= Decrypt (Receipt); P = Observe (Requestor) K = privatekeyRequest(p); Token T = Ownersign(f,p,ts); Reply = { k,p,Ts, t} SendToRequestor{ Encrypt(Reply)} Endif Digital signature is used to maintain piracy prevention in authorized content. First, both distributor and user are fully trusted. Their public keys are known to all videos. The piracy prevention consists of two integral parts: token generation and authorization verification. All videos are encrypted using the session key assigned by the transaction server at purchase time. A token is a digital signature of a three tuple :{ endpoint, file ID, timestamp} signed by the private key of the content owner. Since bootstrap agent has a copy of the digital receipt sent by transaction server, verifying the receipt is thus done locally. The Decrypt (Receipt) function decrypts the digital receipt to identify the file .The Observe (requestor) returns with the endpoint address. 3.2.1 Piracy Prevention Peer Authorization Protocol Input : T = Token, ts= timestamp, S = Peer signature
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 43 Φ(λ,p)=file index for file at end point p Output: Peer authorization status True – Authorization granted False – Authorization Denied The Owner Sign function returns with a token. Upon receiving a private key, the bootstrap agent digitally signs the file ID, endpoint address, and timestamp to create the token. The reply message contains a four tuple :{ endpoint address, private key, timestamp, token}. After token is being generated, user send request to download a video. A download request include a token, file index, timestamp, and the digital signature. If any of the fields are missing, the download is stopped. A download user must have a valid token T and signature S. Two pieces of critical information are needed: public key and the endpoint address. It verifies both token T and signature S. Token also contains the file index information and timestamp indicating the expiration time of the token. The Parse (input) extracts timestamp, token, signature, and index from a download request. 3.3 CONTENT LEAKAGE Due to upload of n number of videos, distributor finds content leakage in the network. Also when user downloads video from the server, the heavy traffic in network arises. It leads to packet loss, jitter and time delay. It leads to content leakage in downloading the videos. Hence it is necessary to solve content leakage. Throughout the video streaming process, the changes of the amount of traffic appear as a unique waveform specifies to the content. Thus by getting this information retrieved in the network, the content leakage can be detected. Pattern generation algorithm is used to match the video from user‘s side and server ‘s side. Based on the time slot , the content leakage can be detected. By applying pattern matching algorithm, content leakage can be recovered. 3.4 CONTENT LEAKAGE RECOVERY Content can be recovered by determination of the decision threshold for detecting leakage. The steps of content recovery are as follows. 1. Threshold determination process 2. Comparison based on traffic pattern 3. Cost evaluation In threshold determination, from the original video a portion of video being taken and generate the corresponding traffic pattern. These patterns are compared with the original traffic pattern to perform sampling of the length of the videos. Then the curve is being generated from the observed traffic pattern. It is necessary to compare the adjusted degree of similarity to the
  • 8. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 04, [October - 2014] e-ISSN: 2349-9745 p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 44 decision threshold to the original video and recover the leakage. Then the cost is being evaluated for the above process. VI. CONCLUSION AND FUTURE WORKS The content leakage of video is being detected and piracy prevention has been proposed for the compressed videos. In future it may be enhanced to detect content leakage for online video conferencing. REFERENCES [1] Xiaosong Lou, Kai Hwang, “Collusive Piracy Prevention in P2P Content Delivery Networks” IEEE TRANSACTION ON COMPUTERS, VOL 58, NO. 7,JULY 2009. [2] Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, and NeiKato,"Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 301-309, Feb. 2014. [3] Y. Liu, Y. Guo, and C. Liang, “A survey on peer-to-peer video streaming systems,”Peer-to- Peer Networking and Applications, Vol.1, No.1, pp.18- 28, Mar. 2008. [4]M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments,” in Proc. IEEE Global Telecommunications Conference, pp.1-5, San Francisco, USA, Nov./Dec. 2006. [5]Z. Yang, H. Ma, and J. Zhang, “A dynamic scalable service model for SIP-based video conference,” in Proc. 9th International Conference on Computer Supported Cooperative Work in DE. [6]O. Adeyinka, “Analysis of IPSec VPNs Performance in A Multimedia Environment,” School of Computing and Technology, University of East London. [7]http://www.lunarpages.com/uptime/importance-videos-business [8]http://goanimate.com/video-makertips/why-video-marketing-important [9]http://www.onemarketmedia.com/2011/01/03/51-ways-to-use-web-video-to-help-your- business-grow/ [10]http:/en.wikipedia.org/wiki/Shared_resouce