SlideShare a Scribd company logo
IMPROVED PRIVACY-PRESERVING P2P
MULTIMEDIA DISTRIBUTION
BASED ON RECOMBINED
FINGERPRINTS
Domain : Secure computing
Guide: Varija Madam
Vaishali Misra
Laxmi Praythusha
Y. Praythusha
Sai Chandra
OBJECTIVE
 Legal distribution of multimedia contents .
 Preserve the privacy of both the sender and
receiver.
 Usage of Recombined fingerprints which are more
secured.
 Trace the illegal re-distribution of contents.
INTRODUCTION
 Computer security is information security as
applied to computers and networks.
 Anonymous fingerprint has been suggested as a
convenient solution for the legal distribution of
multimedia contents with copyright protection.
 Recombined fingerprint approach results in an
efficient privacy-preserving and P2P-based
fingerprinting system.
EXISTING SYSTEM
 Symmetric scheme: Merchant will have
fingerprinted copy, the buyer wont be accused of ill-
legal distribution.
 Asymmetric scheme: merchant does not have
access to the fingerprinted copy, but he can recover
in case of illegal redistribution.
 Anonymous scheme: The buyer preserves her
anonymity and cannot be linked to the purchase of
a specific content, except if she participates in an
illegal redistribution.
DISADVANTAGES
 Developing a practical system using this idea
appears difficult.
 Homo-morphic encryption.
 Implementation is not simple and requires complex
protocol.
PROPOSED SYSTEM
 The content is divided into several ordered
fragments called segment.
 The merchant distributes different copies to a
reduced set of M seed buyers.
 The buyers other than the seed ones engage on
P2P transfers of the content.
 The fingerprint of each new buyer is built as a
recombination of the segments of its parents.
 A transaction record is created by a transaction
monitor to keep track of each transfer between peer
buyers.
 The fingerprint’s hashes are encrypted in such a
way that the private key of at least one parent is
required for obtaining their clear text.
 The real identities of buyers are known only by the
merchant.
ADVANTAGES
 A more efficient and practical system, especially as
traitor tracing protocol.
 Buyers frameproofness is guaranteed.
 Encryption is only for short bit strings, such as the
binary fingerprints and hashes, not to the content.
SYSTEM DESIGN
 The system design should focus on the amount of
input required, controlling the errors, avoiding delay.
 A quality output is one, which meets the
requirements of the end user and presents the
information clearly.
SYSTEM CONFIGURATION:
 Operating system : Windows XP.
 Coding Language: JAVA
 Data Base : MYSQL
SYSTEM ARCHITECTURE
DATAFLOW DIAGARAM
USE CASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
MODULES
 Merchant: He distributes copies of the content legally to
the seed buyers.
 Buyer’s privacy:The identity of a buyer who has
purchased a specific content could be revealed by a
coalition of two parties.
 Transaction monitor: It keeps a transaction register for
each purchase carried out for each buyer.
 Database authentication attacks : An attacker may try to
obtain the fingerprint of a buyer that is stored in the
transaction monitor’s database.
SYSTEM TESTING
 Unit testing
 Integration testing
 Function testing
 System test
 White box testing
 Black box testing
CONCLUSION
 Recombined fingerprint strategy provides more
security.
 Buyers need not to compromise their privacy.
 Recombined fingerprint strategy for data transfer
relates with the real time scenarios as the DNA
fingerprints.
REFERENCE
 David Megıas, “Improved Privacy-Preserving P2P
Multimedia Distribution Based on Recombined
Fingerprints”, IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING,
VOL. 12, NO. 2, MARCH/APRIL, 2015.
Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints

More Related Content

What's hot

Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
asrabatool
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
EIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular SystemEIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular System
Sri Manakula Vinayagar Engineering College
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
Laili Aidi
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
Guided Transmission Media
Guided  Transmission MediaGuided  Transmission Media
Guided Transmission Media
Rajapriya82
 
Mime
MimeMime
Mime
pullel
 
5 transmission media
5 transmission media5 transmission media
5 transmission media
Samit Singh
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
Hitesh Mohapatra
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
Reza Rahimi
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
summer training report on python
summer training report on pythonsummer training report on python
summer training report on python
Shubham Yadav
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Vikas Sharma
 
bus network ppt by pearl patel
bus network ppt by pearl patelbus network ppt by pearl patel
bus network ppt by pearl patel
patel12300
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Network commands
Network commandsNetwork commands
Network commands
Dr. Mahadev Gawas
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
ChAwais15
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 

What's hot (20)

Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
EIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular SystemEIA / TIA IS-136 Digital Cellular System
EIA / TIA IS-136 Digital Cellular System
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Guided Transmission Media
Guided  Transmission MediaGuided  Transmission Media
Guided Transmission Media
 
Mime
MimeMime
Mime
 
5 transmission media
5 transmission media5 transmission media
5 transmission media
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
summer training report on python
summer training report on pythonsummer training report on python
summer training report on python
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
bus network ppt by pearl patel
bus network ppt by pearl patelbus network ppt by pearl patel
bus network ppt by pearl patel
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Network commands
Network commandsNetwork commands
Network commands
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 

Similar to Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints

Improved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimediaImproved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimedia
jpstudcorner
 
Peer-to-Peer content distribution using automatically recombined fingerprints
Peer-to-Peer content distribution using automatically recombined fingerprintsPeer-to-Peer content distribution using automatically recombined fingerprints
Peer-to-Peer content distribution using automatically recombined fingerprints
IJERA Editor
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
eSAT Journals
 
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
IhzaNugroho
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
Journal For Research
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
1crore projects
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
1crore projects
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
JPINFOTECH JAYAPRAKASH
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Shakas Technologies
 
ISACA - The False Sense of Security
ISACA - The False Sense of SecurityISACA - The False Sense of Security
ISACA - The False Sense of Security
Fabian Borg
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
Tawhid Rahman
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
IJERA Editor
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
Qafis
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
Rebecca Jones
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
FumikageTokoyami4
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
Mohammed Sajjad Ali
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 

Similar to Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints (20)

Improved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimediaImproved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimedia
 
Peer-to-Peer content distribution using automatically recombined fingerprints
Peer-to-Peer content distribution using automatically recombined fingerprintsPeer-to-Peer content distribution using automatically recombined fingerprints
Peer-to-Peer content distribution using automatically recombined fingerprints
 
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
 
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)2021091518365700015701 mdia6055 digital auvi streaming   session 17_18 (1)
2021091518365700015701 mdia6055 digital auvi streaming session 17_18 (1)
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
 
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...Improved privacy preserving p2 p multimedia distribution based on recombined ...
Improved privacy preserving p2 p multimedia distribution based on recombined ...
 
ISACA - The False Sense of Security
ISACA - The False Sense of SecurityISACA - The False Sense of Security
ISACA - The False Sense of Security
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 

Recently uploaded

Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 

Recently uploaded (20)

Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 

Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints

  • 1. IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS Domain : Secure computing Guide: Varija Madam Vaishali Misra Laxmi Praythusha Y. Praythusha Sai Chandra
  • 2. OBJECTIVE  Legal distribution of multimedia contents .  Preserve the privacy of both the sender and receiver.  Usage of Recombined fingerprints which are more secured.  Trace the illegal re-distribution of contents.
  • 3. INTRODUCTION  Computer security is information security as applied to computers and networks.  Anonymous fingerprint has been suggested as a convenient solution for the legal distribution of multimedia contents with copyright protection.  Recombined fingerprint approach results in an efficient privacy-preserving and P2P-based fingerprinting system.
  • 4. EXISTING SYSTEM  Symmetric scheme: Merchant will have fingerprinted copy, the buyer wont be accused of ill- legal distribution.  Asymmetric scheme: merchant does not have access to the fingerprinted copy, but he can recover in case of illegal redistribution.  Anonymous scheme: The buyer preserves her anonymity and cannot be linked to the purchase of a specific content, except if she participates in an illegal redistribution.
  • 5. DISADVANTAGES  Developing a practical system using this idea appears difficult.  Homo-morphic encryption.  Implementation is not simple and requires complex protocol.
  • 6. PROPOSED SYSTEM  The content is divided into several ordered fragments called segment.  The merchant distributes different copies to a reduced set of M seed buyers.  The buyers other than the seed ones engage on P2P transfers of the content.  The fingerprint of each new buyer is built as a recombination of the segments of its parents.
  • 7.  A transaction record is created by a transaction monitor to keep track of each transfer between peer buyers.  The fingerprint’s hashes are encrypted in such a way that the private key of at least one parent is required for obtaining their clear text.  The real identities of buyers are known only by the merchant.
  • 8. ADVANTAGES  A more efficient and practical system, especially as traitor tracing protocol.  Buyers frameproofness is guaranteed.  Encryption is only for short bit strings, such as the binary fingerprints and hashes, not to the content.
  • 9. SYSTEM DESIGN  The system design should focus on the amount of input required, controlling the errors, avoiding delay.  A quality output is one, which meets the requirements of the end user and presents the information clearly. SYSTEM CONFIGURATION:  Operating system : Windows XP.  Coding Language: JAVA  Data Base : MYSQL
  • 16. MODULES  Merchant: He distributes copies of the content legally to the seed buyers.  Buyer’s privacy:The identity of a buyer who has purchased a specific content could be revealed by a coalition of two parties.  Transaction monitor: It keeps a transaction register for each purchase carried out for each buyer.  Database authentication attacks : An attacker may try to obtain the fingerprint of a buyer that is stored in the transaction monitor’s database.
  • 17. SYSTEM TESTING  Unit testing  Integration testing  Function testing  System test  White box testing  Black box testing
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. CONCLUSION  Recombined fingerprint strategy provides more security.  Buyers need not to compromise their privacy.  Recombined fingerprint strategy for data transfer relates with the real time scenarios as the DNA fingerprints.
  • 23. REFERENCE  David Megıas, “Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 2, MARCH/APRIL, 2015.