SlideShare a Scribd company logo
Improved Privacy-Preserving P2P Multimedia Distribution
Based on Recombined Fingerprints
ABSTRACT:
Anonymous fingerprint has been suggested as a convenient solution for the legal
distribution of multimedia contents with copyright protection whilst preserving the
privacy of buyers, whose identities are only revealed in case of illegal re-
distribution. However, most of the existing anonymous fingerprinting protocols are
impractical for two main reasons: 1) the use of complex time-consuming protocols
and/or homomorphic encryption of the content, and 2) a unicast approach for
distribution that does not scale for a large number of buyers. This paper stems from
a previous proposal of recombined fingerprints which overcomes some of these
drawbacks. However, the recombined fingerprint approach requires a complex
graph search for traitor tracing, which needs the participation of other buyers, and
honest proxies in its P2P distribution scenario. This paper focuses on removing
these disadvantages resulting in an efficient, scalable, privacy-preserving and P2P-
based fingerprinting system.
EXISTING SYSTEM:
 Most fingerprinting systems can be classified in three categories, namely
symmetric, asymmetric and anonymous schemes.
 In symmetric schemes, the merchant is the one who embeds the fingerprint
into the content and forwards the result to the buyer; hence, the buyer cannot
be formally accused of illegal re-distribution, since the merchant also had
access to the fingerprinted content and could be responsible for the re-
distribution.
 In asymmetric fingerprinting, the merchant does not have access to the
fingerprinted copy, but he can recover the fingerprint in case of illegal re-
distribution and thereby identify the offending buyer.
 In anonymous fingerprinting, in addition to asymmetry, the buyer preserves
her anonymity (privacy) and hence she cannot be linked to the purchase of a
specific content, unless she participates in an illegal re-distribution.
DISADVANTAGES OF EXISTING SYSTEM:
 Developing a practical system using this idea appears difficult, because
public-key encryption expands data and substantially increases the
communication bandwidth required for transfers.
 Homomorphic encryption constrains the type of mathematical operations
which can be performed on the content for embedding, making it difficult to
use the more advanced and robusttechniques in the data hiding literature.
 In addition, the application of this idea in a distributed scenario (such as P2P
networks) is not simple, since embedding would have to be performed by
peer buyers, requiring a complex and supervised protocol.
PROPOSED SYSTEM:
 The content is divided into several ordered fragments and each of them is
embedded separately with a random binary sequence. The binary sequence
for each fragment is called segment and the concatenation of all segments
forms the whole fingerprint.
 The merchant distributes different copies to a reduced set of M seed buyers.
The fingerprints of these buyers are such that their segments have low pair-
wise correlations.
 The buyers other than the seed ones engage on P2P transfers of the content
in such a way that each new buyer obtains fragments from at least two other
buyers. The total number of buyers is N _ M.
 The communication between peer buyers is anonymous through an onion
routing-like protocolusing a proxy.
 The fingerprint of each new buyer is built as a recombination of the
segments of its parents.
 Proxies know the pseudonyms of source and destination buyers and they
have access to the symmetric keys used for encrypting the multimedia
content.
 A transaction record is created by a transaction monitor to keep track of each
transfer between peer buyers. These records do not contain the embedded
fingerprints, but only an encrypted hash of them.
 The fingerprints’ hashes are encrypted in such a way that the private key of
at least one parent is required for obtaining their cleartext.
 The real identities of buyers are known only by the merchant. The
transaction monitor records buyers’ pseudonyms.
 In case of illegal re-distribution, a search is required through the distribution
graph. The search starts from the seed buyers and is directed by a correlation
function between the traced fingerprint and the fingerprints of the tested
buyers. These tested buyers must co-operate with a tracing authority to
compute the correlation between their fingerprint and the one extracted from
the illegally re-distributed file. The fingerprints’ hashes recorded in the
transaction monitor are enough to prevent buyers from cheating in this step.
 At each step of the traitor tracing protocol, the buyer with maximum
correlation is chosen as the most likely ancestor of the illegal re-distributor.
This criterion is mostly right, but some incorrect choices may occur during
the search process, requiring the exhaustion of a subgraph and backtracking.
 The search ends when perfect correlation is found between the fingerprint of
the tested buyer and that of the illegally re-distributed file. If a buyer refuses
to take a correlation test, the hash recorded in the transaction monitor can be
used as evidence against her.
ADVANTAGES OF PROPOSED SYSTEM:
 This paper reviews the main features of the proposal suggested, highlights
its main drawbacks, and suggests several significant improvements to
achieve a more efficient and practical system, especially as traitor tracing is
concerned, since it avoids the situations in which illegal redistributors cannot
be traced with the proposal.
 Furthermore, better security properties against potentially malicious proxies
are obtained.
 Although the system proposed in this paper uses publickey encryption in the
distribution and traitor tracing protocols, it must be taken into account that
this encryption is only applied to short bit strings, such as the binary
fingerprints and hashes, not to the content. The fragments of the content are
encrypted using symmetric cryptography, which is much more efficient.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : ASP.net, C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
REFERENCE:
David Megıas, Member, IEEE, “Improved Privacy-Preserving P2P Multimedia
Distribution Based on Recombined Fingerprints”, IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 2,
MARCH/APRIL, 2015.

More Related Content

Viewers also liked

Mapa conceptual cesar
Mapa conceptual cesarMapa conceptual cesar
Mapa conceptual cesar
cesar tovar
 
Vargas
VargasVargas
Teoria de fallas
Teoria de fallasTeoria de fallas
Teoria de fallas
wrpm95
 
Yahoo
YahooYahoo
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamic
jpstudcorner
 
Flow basics2.ppt2
Flow basics2.ppt2Flow basics2.ppt2
Flow basics2.ppt2
viviansareno
 
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
IOSR Journals
 

Viewers also liked (7)

Mapa conceptual cesar
Mapa conceptual cesarMapa conceptual cesar
Mapa conceptual cesar
 
Vargas
VargasVargas
Vargas
 
Teoria de fallas
Teoria de fallasTeoria de fallas
Teoria de fallas
 
Yahoo
YahooYahoo
Yahoo
 
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamic
 
Flow basics2.ppt2
Flow basics2.ppt2Flow basics2.ppt2
Flow basics2.ppt2
 
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
 

Similar to Improved privacy preserving p2 p multimedia

Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Shakas Technologies
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
1crore projects
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
1crore projects
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
eSAT Journals
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
IJERA Editor
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ijaia
 
"Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t..."Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t...
eraser Juan José Calderón
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
IRJET Journal
 
IRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading SystemIRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading System
IRJET Journal
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
ThreadSol
 
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
Journal For Research
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
JPINFOTECH JAYAPRAKASH
 
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
paperpublications3
 
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for TransactionIRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
IRJET Journal
 
Blockchain
BlockchainBlockchain
Blockchain
PedramDehghanpour
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
chennaijp
 
Ijtra150171
Ijtra150171Ijtra150171
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET Journal
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
IEEEFINALYEARPROJECTS
 

Similar to Improved privacy preserving p2 p multimedia (20)

Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
 
"Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t..."Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t...
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
 
IRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading SystemIRJET - Protecting Investors Privacy in Online Trading System
IRJET - Protecting Investors Privacy in Online Trading System
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
 
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
Dentsu Aegis Network’s Innovation Center of Excellence 2019 Blockchain Trend ...
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
 
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for TransactionIRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
 
Blockchain
BlockchainBlockchain
Blockchain
 
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile SensingJPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 

More from jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
jpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
jpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
jpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
jpstudcorner
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
jpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
jpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
jpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
jpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
jpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
jpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
jpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
jpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
jpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
jpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
jpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
jpstudcorner
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
jpstudcorner
 

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 

Recently uploaded

Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
supriyaDicholkar1
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Properties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure MeasurementProperties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure Measurement
Indrajeet sahu
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
Sou Tibon
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
VanTuDuong1
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 

Recently uploaded (20)

Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Properties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure MeasurementProperties of Fluids, Fluid Statics, Pressure Measurement
Properties of Fluids, Fluid Statics, Pressure Measurement
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
309475979-Creativity-Innovation-notes-IV-Sem-2016-pdf.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 

Improved privacy preserving p2 p multimedia

  • 1. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints ABSTRACT: Anonymous fingerprint has been suggested as a convenient solution for the legal distribution of multimedia contents with copyright protection whilst preserving the privacy of buyers, whose identities are only revealed in case of illegal re- distribution. However, most of the existing anonymous fingerprinting protocols are impractical for two main reasons: 1) the use of complex time-consuming protocols and/or homomorphic encryption of the content, and 2) a unicast approach for distribution that does not scale for a large number of buyers. This paper stems from a previous proposal of recombined fingerprints which overcomes some of these drawbacks. However, the recombined fingerprint approach requires a complex graph search for traitor tracing, which needs the participation of other buyers, and honest proxies in its P2P distribution scenario. This paper focuses on removing these disadvantages resulting in an efficient, scalable, privacy-preserving and P2P- based fingerprinting system. EXISTING SYSTEM:  Most fingerprinting systems can be classified in three categories, namely symmetric, asymmetric and anonymous schemes.
  • 2.  In symmetric schemes, the merchant is the one who embeds the fingerprint into the content and forwards the result to the buyer; hence, the buyer cannot be formally accused of illegal re-distribution, since the merchant also had access to the fingerprinted content and could be responsible for the re- distribution.  In asymmetric fingerprinting, the merchant does not have access to the fingerprinted copy, but he can recover the fingerprint in case of illegal re- distribution and thereby identify the offending buyer.  In anonymous fingerprinting, in addition to asymmetry, the buyer preserves her anonymity (privacy) and hence she cannot be linked to the purchase of a specific content, unless she participates in an illegal re-distribution. DISADVANTAGES OF EXISTING SYSTEM:  Developing a practical system using this idea appears difficult, because public-key encryption expands data and substantially increases the communication bandwidth required for transfers.  Homomorphic encryption constrains the type of mathematical operations which can be performed on the content for embedding, making it difficult to use the more advanced and robusttechniques in the data hiding literature.
  • 3.  In addition, the application of this idea in a distributed scenario (such as P2P networks) is not simple, since embedding would have to be performed by peer buyers, requiring a complex and supervised protocol. PROPOSED SYSTEM:  The content is divided into several ordered fragments and each of them is embedded separately with a random binary sequence. The binary sequence for each fragment is called segment and the concatenation of all segments forms the whole fingerprint.  The merchant distributes different copies to a reduced set of M seed buyers. The fingerprints of these buyers are such that their segments have low pair- wise correlations.  The buyers other than the seed ones engage on P2P transfers of the content in such a way that each new buyer obtains fragments from at least two other buyers. The total number of buyers is N _ M.  The communication between peer buyers is anonymous through an onion routing-like protocolusing a proxy.  The fingerprint of each new buyer is built as a recombination of the segments of its parents.
  • 4.  Proxies know the pseudonyms of source and destination buyers and they have access to the symmetric keys used for encrypting the multimedia content.  A transaction record is created by a transaction monitor to keep track of each transfer between peer buyers. These records do not contain the embedded fingerprints, but only an encrypted hash of them.  The fingerprints’ hashes are encrypted in such a way that the private key of at least one parent is required for obtaining their cleartext.  The real identities of buyers are known only by the merchant. The transaction monitor records buyers’ pseudonyms.  In case of illegal re-distribution, a search is required through the distribution graph. The search starts from the seed buyers and is directed by a correlation function between the traced fingerprint and the fingerprints of the tested buyers. These tested buyers must co-operate with a tracing authority to compute the correlation between their fingerprint and the one extracted from the illegally re-distributed file. The fingerprints’ hashes recorded in the transaction monitor are enough to prevent buyers from cheating in this step.  At each step of the traitor tracing protocol, the buyer with maximum correlation is chosen as the most likely ancestor of the illegal re-distributor. This criterion is mostly right, but some incorrect choices may occur during the search process, requiring the exhaustion of a subgraph and backtracking.
  • 5.  The search ends when perfect correlation is found between the fingerprint of the tested buyer and that of the illegally re-distributed file. If a buyer refuses to take a correlation test, the hash recorded in the transaction monitor can be used as evidence against her. ADVANTAGES OF PROPOSED SYSTEM:  This paper reviews the main features of the proposal suggested, highlights its main drawbacks, and suggests several significant improvements to achieve a more efficient and practical system, especially as traitor tracing is concerned, since it avoids the situations in which illegal redistributors cannot be traced with the proposal.  Furthermore, better security properties against potentially malicious proxies are obtained.  Although the system proposed in this paper uses publickey encryption in the distribution and traitor tracing protocols, it must be taken into account that this encryption is only applied to short bit strings, such as the binary fingerprints and hashes, not to the content. The fragments of the content are encrypted using symmetric cryptography, which is much more efficient.
  • 6. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.
  • 7.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: David Megıas, Member, IEEE, “Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 2, MARCH/APRIL, 2015.