SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1703
Secure Multimedia Content Protection and Sharing
Anitha. V1, Priyanka .R2 , Subburam.S3 ,Kapila Vani R.K4
1,2 Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering
College, Chennai, India
3 Professor,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy
Engineering College, Chennai, India
4Assistant Professor, Department of Computer Science and Engineering, Prince Dr. K. Vasudevan College of
Engineering and Technology, Chennai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— Deliberate or inadvertent spillage of classified
information is without a doubt a standout amongst the most
serious security dangers that associations confront in the
computerized period. The danger now reaches out to our own
lives: a plenty of individual data is accessible to informal
communities and cell phone suppliers and is in a roundabout
way exchanged to deceitful outsider and fourth meeting
relevance. In this occupation, we show a non-detailed in
sequence extraction system LIME for information streamover
different elements that take two trademark, vital parts (i.e.,
proprietor and buyer). We characterize the correct security
ensures required by such an information ancestry instrument
toward distinguishing proof of a liable substance, and
recognize the improving non-renouncement and genuineness
suspicions. We then create and dissect a novel responsible
informationexchangeconventionbetweentwoelementsinside
a vindictive domain by expanding upon unaware exchange,
vigorous watermarking, and signatureprimitives. Atlonglast,
we play out a test assessment to exhibit the common sense of
our convention what's more, apply our structuretothecritical
information spillagesituationsofinformationoutsourcing and
interpersonal organizations. By and large, we consider LIME,
our heredity structure for information exchange, to be a key
stride towards accomplishing responsibility by plan.
Key Words: Cloud storage,public audit,Data integrity,Third
Party Auditor (TPA) Data privacy preserving.
1. INTRODUCTION
In the advanced time, data spillage through inadvertent
exposures, on the other hand deliberate damage by
displeased workers and pernicious outer elements, show a
standout amongst the most genuine dangers to associations.
As indicated by afascinatingorderofinformationbreakskept
up by the Privacy Rights Clearinghouse (PRC), in the United
States alone, 868, 045, 823 records have been broken from4,
355 information ruptures made open since 2005. It is not
hard to trust this is quite recently the tip of the icy mass, as
most instances of data spillage go unreported because of
dread of loss of client certainty or administrative
punishments: it costs organizations by and large $214 per
bargained record. Substantial measures of computerized
information can be replicated at no cost and can be spread
through the web in brief time. Furthermore, the danger of
getting got for information spillage is low, as there are at
present no responsibility components. Forthesereasons,the
issue of information spillage has achieved another
measurement these days.
Not just organizationsare influencedbyinformationspillage;
it is additionally a worry to people. The ascent of
interpersonal organizationsand cell phoneshasexacerbated
things. In these situations, people reveal their own data to
different administration suppliers, ordinarily known as
outsiderapplications,consequentlyforsomeconceivablyfree
administrations. Without legitimate controls furthermore,
responsibility components, a large portion of these
applications impart people's distinguishing data to many
promoting furthermore, Internet following organizations.
Indeed, even with get to control instruments, where
access to delicate information is restricted, a pernicious
approved client can distribute touchy information when he
gets it. Primitives like encryption offer insurance just the
length of the data of intrigue is encoded, yet once the
beneficiary unscrambles a message, nothing can keep him
from distributing the decoded content. In this way it appears
difficult to counteract information spillage proactively. Be
that as it may, as found in the taking after situations the
adequacy of arrangements is sketchy as long as it is
impractical to provably relate theblameworthygatheringsto
the spillages.
We find that the above and other information spillage
situations can be relatedtoa nonattendanceofresponsibility
systems amid information exchanges: leakers either don't
concentrate on insurance, or they deliberately uncover
secret information with noworry,astheyarepersuadedthat
the spilled information can't be connected to them. In
different words, when substances realize that they can be
considered responsible for spillage of some data, they will
exhibit a superior responsibility towards its required
insurance. Now and again, distinguishing proof of the leaker
is made conceivable by scientific strategies, yet these are
typically costly and don't continuously create the craved
outcomes. Consequently, we bring up the requirement for a
general responsibility systemininformation exchanges.This
responsibility can be straightforwardly connected with
provably identifying a transmission history of information
over various elements beginning from its birthplace. This is
known as information provenance, information heredity or
source following. The information provenance technique,as
vigorous watermarking strategies or including fake
information, has as of nowbeenrecommendedinthewriting
and utilized by a few enterprises. Be that as it may, most
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1704
endeavors have been speciallyappointedinnatureandthere
is no formal model accessible. Furthermore, the majority of
these methodologies just permit recognizable proof of the
leaker in a non-provable way, which is not adequate as a
rule.
2. EXISTING SYSTEM
In existing framework, recognizable proof of the leaker is
made conceivable by measurablesystems,howevertheseare
normally costly and don't generally create the wanted
outcomes. Hence, we bring up the requirement for a general
responsibility component in information exchanges. This
responsibility can be straightforwardly connected with
provablydistinguishingatransmissionhistoryofinformation
over various substances beginning from its root. This is
known as information provenance, information ancestry or
source following. The information provenance strategy is
utilizing strong technique including fake information in
inserted message, so that permit of distinguishing proof of
leaker is insufficient to discover leaker.
Disadvantages of Existing System:
1. In interpersonal organizations break of touchy
private data about the clients and their companions
is conceivable even after approach requirement.
2. Data with get to control instrument, where access
to delicate information is restricted, a malevolent
approved outsider can distribute touchy
information after he/she gets information.
3. Repeated mass outsourcing of touchy data with set
of rules implemented can be perniciously
genealogy for money related advantages.
4. A legal system is too expensive for distinguishing
methods.
3. OUR CONTRIBUTIONS
In this venture we characterize LIME technique (Lineage in
Malicious Environment)topersonalitytheliableparty.Inthis
strategy wedole out an obviously characterize administer to
each included gathering and force the between connections
between these parts. Three distinct parts are information
supplier, information buyer (outsider), and examiner. The
information supplier part is to keep up the archives
(images).The information purchaser (outsider) gets the
record and furthermore forward the report to another
outsider.
Reviewer is conjured when aspillageishappens,heisjust
mindful to discover a spillage (blameworthygathering).Heis
summoned by a proprietor and gave the spilled information.
The spilled information was assessed by examiner utilizing
LIME and in this technique, there is distinguishing data
implanted for every customer who got the information.
Undetectable watermarking is done utilizing stenography in
each outsourced picture. Utilizing this data the evaluatorcan
make a genealogy, by cross checking and he discovers the
leaker.
The proposed model of this project isas showninthefigure1
which consists of four main phases as follows,
 Data Upload and Outsource Request.
 Accepting Request and watermarking Method.
 Access Control and Forwarding Data.
 Data Lineage method.
Data Upload and Outsource Request
In this module every association needs to enlist and
transfer a few records like picture,isinchargeofdealingwith
the archives. The customer (outsider) picks the supplier and
gets the supplier's picture list. Purchasers pick the pictures
which one he needs and give the demand to particular
supplier.
4. SYSTEM ARCHITECTURE
Accepting Request and watermarking Method
Wheninformationsupplierloginwithhisqualificationshe
can see thedemandnoticesandcanacknowledgethedemand
or leave as it seems to be. In the wake of tolerating the
demand, then the archives to be send is watermarked. Here
strong watermarking technique is utilized which utilizes
stenographicstrategytoinstallthedata.Theimplanteddata's
are purchasername,suppliernameandfilename.Thesethree
data's are changed to mark utilizing HMAC calculation. The
entire data is scrambled utilizing RSA calculation .The
encoded data is inserted intothepicture.Masswatermarking
is done which is prepared for outsourcing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1705
Access Control and Forwarding Data
Get to Control Mechanism is to limit the buyer to forward the
records that is how frequently the archivescanbeexchanged
to another purchaser (outsider). So client can't forward the
records to numerous outsiders.Afterlimitation,thepictureis
forward to that asked for purchaser. Customer login with his
certifications he/she can see the picture.
Data lineage Method
Get to Control Mechanism is to limit the buyer to forward
the records that is how frequently the archives can be
exchanged to another purchaser (outsider). So client can't
forward the records to numerous outsiders. After limitation,
the picture is forward to that asked for purchaser. Customer
login with his certifications he/she can see the picture.
The reviewer at first takes the proprietor as the flow
presume sends the spilledarchivetotheebbandflowsuspect
and requests that he give thedecodingkeytothewatermarks
in this record. Utilizing the key, reviewer can decode the
report .Thebuyer name is enlisted clientthenthecustomeris
trusted. In the event that client is not enlisted client, the
implanted data length will fluctuate, then evaluator adds the
genealogy in shopper .After cross check between the
presumes a definitive leaker of the picture is recognized.
5. RELATED WORKS
1. Shafi Goldwasser, Silvio Micali And Ronald L. Rivest in
1988. Present a digital signature scheme based on the
computational difficulty of integer factorization. The scheme
possesses the work of fiction property of being healthy
alongside an adaptive chosen-message attack: an adversary
who receives signatures for messages of his choice (where
each message may be chosen in a way that depends on the
autograph of beforehand preferred communication) cannot
afterward create the autograph of even a single additional
message. This may be somewhat surprising, since in the
folklore the possessions ofencompassfalsificationindividual
corresponding to factoring and organism unassailable to an
adaptive chosen-message attack were considered to be
contradictory. More generally, we show how to assemble a
mark system with such belongings bottom on the
continuation of a "claw-free" pair of permutations--a
potentially weaker assumption than the intractability of
numeral factorization. The new method is potentially
practical:signingandverifyingsignaturesarereasonablyfast,
and signatures are compact.
2. Zhiyong Zhang in 2011, Progressive and dynamic
developments in the digital content industry are significantly
dependent on copyright protection. Successful use control
advances can ensure that end purchasers can lawfully get to,
exchange, and share copyrighted substance and relating
computerized rights. From thespecializedandadministrative
points of view, we give a wide review on cutting edge of
Digital Rights Management (DRM) frameworks. This paper
begins with a non specific DRM biological system that
adequately underpins two run of the mill application
situations, and the environment assembles multi-partner
trust and amplifies chance administration openings. And
furthermore, an all encompassing and far reaching
examination of use control models, approaches, and
component were made in detail. These incorporate, yet are
not constrained to, different correlations of rights expression
dialects, security models, approval administration, rights
exchange, and dependable use of secure end-client
computerized gadgets or purchaser hardware.Atlast,ascope
of open issues and difficulties for DRM biological systems are
highlighted. An assortment of controllable and traceable
rights sharing among e-clients, in blend with security hazard
administration, will be the key for rising informal
organization administrations.
3. Emil Praun Hugues Hoppey Adam Finkelstein Princeton,
We describe a robust method for watermarking triangle
meshes. Watermarking gives a component to copyright
assurance of computerized media by implanting data
distinguishing the proprietor in the information. The greater
part of the examination on advanced watermarks has
concentrated on media, for example, pictures, video, sound,
and content. Powerful watermarks must have the capacity to
survive an assortment of "assaults", including resizing,
trimming, and separating. For strength to such assaults, late
watermarking plans utilize a"spread-range" approach– they
change the archive to the recurrence area and annoy the
coefficients of the perceptually most huge premisecapacities.
We extend this spread-range way to deal with work for the
hearty watermarking of discretionary triangle networks.
Summing up spread range methods to surfaces presents two
noteworthy difficulties. To start with, self-assertive surfaces
do not have a characteristic parametrization for recurrence
based decay. Our answer is to build an arrangement of scalar
premise work over theworkverticesutilizingmultiresolution
investigation. The watermark irritates vertices along the
heading of the surface ordinary, weighted by the premise
capacities. The second test is that rearrangements and
different assaults may adjust the network of the work. We
utilize a streamlining procedure to resample an assaulted
work utilizing the first work availability. Comes about
demonstrate that our watermarks are impervious to normal
work operations, for example, interpretation, revolution,
scaling, editing, smoothing, disentanglement,andresampling,
also asmalicious assaults, for example, the addition of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1706
commotion, change of low-request bits, or even inclusion of
different watermarks.
4. David Megı´as, Josep Domingo-Ferrer, Multicast
dissemination of substance is not suited to content-based
electronic business sinceallpurchasersacquiretheverysame
duplicate of the substance, in a manner that unlawful
redistributors can't be followed. Unicast circulation has the
deficiency of requiring one association with every purchaser,
except it permits the vendor to install an alternate serial
number in the duplicate acquired by every purchaser, which
empowers redistributor following. Peer-topeer (P2P)
circulation is a third alternative which may join a portion of
the benefits of multicast and unicast: from one viewpoint, the
vendor just needs unicast associations with a couple seed
purchasers, who assume control over the errand of further
spreading the substance; then again, if a legitimate
fingerprinting component is utilized, unlawful redistributors
of the P2P-dispersed substance can even now be followed. In
this paper, we propose a novel fingerprinting system for P2P
content dissemination which permitsredistributorfollowing,
while saving the security of most legitimate purchasers and
offeringconspiracyresistanceandpurchaserframeproofness.
5. Karen Su, Deepa Kundurand Dimitrios Hatzinakosin2005,
In this paper, we display a hypothetical structure for the
straight intrigue investigation of watermarked advanced
video groupings, and determine another hypothesis
comparing a meaning of factual intangibility, plot resistance,
and two down to earth watermark configuration rules. The
proposed structure is basic and instinctive; the essential
preparing unit is the videoedgeandweconsidersecondorder
measurable portrayals of their worldly between connections.
Inside this expository setup, we characterize the straight
casing conspiracy assault, the scientific idea of a measurably
imperceptiblevideowatermark,anddemonstratethatthelast
is a compelling counterattack against the previous. At long
last, to show how the hypothetical outcomes nitty gritty in
this paper can undoubtedly be connected to the development
of plot safevideo watermarks, weexemplify the investigation
into two pragmatic video watermark configuration decides
that assume a key part in the consequent improvement of a
novel arrangement safe video watermarking calculation
talked about in a partner paper.
Algorithms
 HMAC algorithm
 RSA algorithm
 LIME algorithm
Enhancement
o In this venture we upgraded watermarking utilizing
stenography technique.
o Creating information as a mark utilizing HMAC
calculationand furthermoreencodethe information
utilizing RSA calculation.
o Bulk Outsourcing is to be finished
6. CONCLUSIONS
WeexhibitLIME,amodelforresponsibleinformation
exchange over different substances. We characterize taking
part parties, their interrelationships and give a solid
instantiationforaninformationexchangeconventionutilizing
vigorous watermarking and computerized marks. We
discover leaker in malignant environment utilizing
information heredity strategy.
7. REFERENCES
[1] S. Goldwasser, S.Micali , and R .L. Rivest ,”A digital
signature scheme secure against adaptive chosen-
message attacks,” SIAM J . Comput. , Vol.17.
[2] Emil Praun_Hugues Hoppey Adam Finkelstein Princeton
University,“Robust mesh watermarking ,”IEEETransactions
on multimedia vol.10 Issue 8 Dec-2008.
[3] Karen Su,Deepa Kundur and Dimitrios
Hatzinakos,”Statistical invisibility for collusion resistant
digital video watermarking,”IEEE Transactions on
multimedia,vol.7,No.1,Feb-2005.
[4] A. Mascher-Kampfer, H. St ¨ogner, and A. Uhl, “Multiple
re-watermarking scenarios,” in Proceedings of the 13th
International
Conference on Systems, Signals, andImageProcessing(IWSSIP
2006).
Citeseer, 2006, pp. 53–56.
[5] P. Papadimitriou and H. Garcia-Molina, “Data leakage
detection,”
Knowledge and Data Engineering, IEEE Transactions on, vol.
23, no. 1,
pp. 51–63, 2011.
[6] “Pairing-Based Cryptography Library (PBC),”
http://crypto.stanford.edu/pbc.
[7] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure
spread
spectrum watermarking for multimedia,” Image Processing,
IEEE Transactions on, vol. 6, no. 12, pp. 1673–1687, 1997.
[8] B. Pfitzmann and M. Waidner, “Asymmetric
fingerprinting for larger
collusions,” in Proceedings of the 4th ACM conference on
Computer
and communications security, ser. CCS ’97, 1997, pp. 151–
160.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1707
[9] S. Goldwasser, S. Micali, and R. L. Rivest, “A digital
signature scheme secure against adaptive chosen-message
attacks,” SIAM J. Comput.vol. 17, no. 2, pp. 281–308, 1988.
[10] A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, “A
computational model for watermark robustness,” in
Information Hiding. Springer, 2007, pp. 145–160.
[11] J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon,R.
E. Tarjan, and F. Zane, “Resistance of digital watermarks to
collusive attacks,” in IEEE International Symposium on
Information Theory, 1998, pp. 271–271.
[12] M. Naor and B. Pinkas, “Efficient oblivious transfer
protocols,” in
Proceedings of the Twelfth Annual ACM-SIAM Symposium on
Discrete
Algorithms, 2001, pp. 448–457.
[13] “GNU Multiple Precision Arithmetic Library (GMP),”
http://gmplib.org/.
[14] D. Boneh, B. Lynn, and H. Shacham, “Short signatures
from the Weil pairing,” in AdvancesinCryptology-ASIACRYPT
2001. Springer,
2001, pp. 514–532.
[14] W. Dai, “Crypto++ Library,” http://cryptopp.com.
[15] P. Meerwald, “Watermarking toolbox,”
http://www.cosy.sbg.ac.at/_pmeerw/Watermarking/source.
[16] Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, “Extending
oblivious
transfers efficiently,” in Advances in Cryptology-CRYPTO
2003.
Springer, 2003, pp. 145–161.
[17] M. Backes, N. Grimm, and A. Kate, “Lime: Data lineage in
the
malicious environment,” in Security and Trust Management -
10th
International Workshop, STM 2014, Wroclaw, Poland,
September 10-11,
2014. Proceedings, 2014, pp. 183–187.
[18] R. Hasan, R. Sion, and M. Winslett, “The case of the fake
picasso:
Preventing historyforgery withsecure provenance,”inFAST,
2009, pp.
1–14.
[19] A. Pretschner, M. Hilty, F. Sch¨utz, C. Schaefer, and T.
Walter, “Usage Control Enforcement: Present and Future,”
IEEE Security & Privacy vol. 6, no. 4, pp. 44–53, 2008.
[20] F. Kelbert and A. Pretschner, “Data usage control
enforcement in
distributed systems,” in CODASPY, 2013, pp. 71–82.
[21] F. Salim, N. P. Sheppard, and R. Safavi-Naini, “A Rights
Management Approach to Securing Data Distribution in
Coalitions,” in NSS, 2010, pp. 560–567.
[22] N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona,
“Secure multimedia authoringwithdishonestcollaborators,”
EURASIP J. Appl. Signal Process., vol. 2004, pp. 2214–2223,
2004.
[23] G. S. Poh, “Design and Analysis of Fair Content Tracing
Protocols,”
Ph.D. dissertation, 2009.
R. Petrovic and B. Tehranchi, “Watermarkinginanencrypted
domain,”
Jul. 7 2006, uS Patent App. 11/482,519.
[24] R. Anderson and C. Manifavas, “Chameleon - A newkind
of stream
cipher,” in Fast SoftwareEncryption.Springer,1997,pp.107–
113.
[25] A.-R. Sadeghi, “Secure fingerprinting on sound
foundations,” Ph.D.
dissertation, 2004.
[26] J. Domingo-Ferrer,“Anonymousfingerprinting based on
committed
oblivious transfer,” in Public Key Cryptography. Springer,
1999, pp.
43–52.
[27] A.-R. Sadeghi, “How to break a semi-anonymous
fingerprinting
scheme,” in Information Hiding.Springer,2001,pp.384–394.

More Related Content

What's hot

Defeating Cyber Threats
Defeating Cyber ThreatsDefeating Cyber Threats
Defeating Cyber Threats
Envision Technology Advisors
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
Ulf Mattsson
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET Journal
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
IRJET Journal
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
Andris Soroka
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
James Neo
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
WeSecure
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
Triskele Labs
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
Andris Soroka
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
CloudMask inc.
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
EMC
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
Gabe Akisanmi
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
 

What's hot (17)

Defeating Cyber Threats
Defeating Cyber ThreatsDefeating Cyber Threats
Defeating Cyber Threats
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 

Similar to Secure Multimedia Content Protection and Sharing

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
redpel dot com
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
Pvrtechnologies Nellore
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Doctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemDoctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management System
IRJET Journal
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
IRJET Journal
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
IJERA Editor
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Marco Essomba
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET Journal
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
ClearDATACloud
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
IRJET Journal
 

Similar to Secure Multimedia Content Protection and Sharing (20)

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Doctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management SystemDoctor’s Appointment and E-Prescription Access Management System
Doctor’s Appointment and E-Prescription Access Management System
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 

Recently uploaded (20)

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 

Secure Multimedia Content Protection and Sharing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1703 Secure Multimedia Content Protection and Sharing Anitha. V1, Priyanka .R2 , Subburam.S3 ,Kapila Vani R.K4 1,2 Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai, India 3 Professor,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai, India 4Assistant Professor, Department of Computer Science and Engineering, Prince Dr. K. Vasudevan College of Engineering and Technology, Chennai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— Deliberate or inadvertent spillage of classified information is without a doubt a standout amongst the most serious security dangers that associations confront in the computerized period. The danger now reaches out to our own lives: a plenty of individual data is accessible to informal communities and cell phone suppliers and is in a roundabout way exchanged to deceitful outsider and fourth meeting relevance. In this occupation, we show a non-detailed in sequence extraction system LIME for information streamover different elements that take two trademark, vital parts (i.e., proprietor and buyer). We characterize the correct security ensures required by such an information ancestry instrument toward distinguishing proof of a liable substance, and recognize the improving non-renouncement and genuineness suspicions. We then create and dissect a novel responsible informationexchangeconventionbetweentwoelementsinside a vindictive domain by expanding upon unaware exchange, vigorous watermarking, and signatureprimitives. Atlonglast, we play out a test assessment to exhibit the common sense of our convention what's more, apply our structuretothecritical information spillagesituationsofinformationoutsourcing and interpersonal organizations. By and large, we consider LIME, our heredity structure for information exchange, to be a key stride towards accomplishing responsibility by plan. Key Words: Cloud storage,public audit,Data integrity,Third Party Auditor (TPA) Data privacy preserving. 1. INTRODUCTION In the advanced time, data spillage through inadvertent exposures, on the other hand deliberate damage by displeased workers and pernicious outer elements, show a standout amongst the most genuine dangers to associations. As indicated by afascinatingorderofinformationbreakskept up by the Privacy Rights Clearinghouse (PRC), in the United States alone, 868, 045, 823 records have been broken from4, 355 information ruptures made open since 2005. It is not hard to trust this is quite recently the tip of the icy mass, as most instances of data spillage go unreported because of dread of loss of client certainty or administrative punishments: it costs organizations by and large $214 per bargained record. Substantial measures of computerized information can be replicated at no cost and can be spread through the web in brief time. Furthermore, the danger of getting got for information spillage is low, as there are at present no responsibility components. Forthesereasons,the issue of information spillage has achieved another measurement these days. Not just organizationsare influencedbyinformationspillage; it is additionally a worry to people. The ascent of interpersonal organizationsand cell phoneshasexacerbated things. In these situations, people reveal their own data to different administration suppliers, ordinarily known as outsiderapplications,consequentlyforsomeconceivablyfree administrations. Without legitimate controls furthermore, responsibility components, a large portion of these applications impart people's distinguishing data to many promoting furthermore, Internet following organizations. Indeed, even with get to control instruments, where access to delicate information is restricted, a pernicious approved client can distribute touchy information when he gets it. Primitives like encryption offer insurance just the length of the data of intrigue is encoded, yet once the beneficiary unscrambles a message, nothing can keep him from distributing the decoded content. In this way it appears difficult to counteract information spillage proactively. Be that as it may, as found in the taking after situations the adequacy of arrangements is sketchy as long as it is impractical to provably relate theblameworthygatheringsto the spillages. We find that the above and other information spillage situations can be relatedtoa nonattendanceofresponsibility systems amid information exchanges: leakers either don't concentrate on insurance, or they deliberately uncover secret information with noworry,astheyarepersuadedthat the spilled information can't be connected to them. In different words, when substances realize that they can be considered responsible for spillage of some data, they will exhibit a superior responsibility towards its required insurance. Now and again, distinguishing proof of the leaker is made conceivable by scientific strategies, yet these are typically costly and don't continuously create the craved outcomes. Consequently, we bring up the requirement for a general responsibility systemininformation exchanges.This responsibility can be straightforwardly connected with provably identifying a transmission history of information over various elements beginning from its birthplace. This is known as information provenance, information heredity or source following. The information provenance technique,as vigorous watermarking strategies or including fake information, has as of nowbeenrecommendedinthewriting and utilized by a few enterprises. Be that as it may, most
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1704 endeavors have been speciallyappointedinnatureandthere is no formal model accessible. Furthermore, the majority of these methodologies just permit recognizable proof of the leaker in a non-provable way, which is not adequate as a rule. 2. EXISTING SYSTEM In existing framework, recognizable proof of the leaker is made conceivable by measurablesystems,howevertheseare normally costly and don't generally create the wanted outcomes. Hence, we bring up the requirement for a general responsibility component in information exchanges. This responsibility can be straightforwardly connected with provablydistinguishingatransmissionhistoryofinformation over various substances beginning from its root. This is known as information provenance, information ancestry or source following. The information provenance strategy is utilizing strong technique including fake information in inserted message, so that permit of distinguishing proof of leaker is insufficient to discover leaker. Disadvantages of Existing System: 1. In interpersonal organizations break of touchy private data about the clients and their companions is conceivable even after approach requirement. 2. Data with get to control instrument, where access to delicate information is restricted, a malevolent approved outsider can distribute touchy information after he/she gets information. 3. Repeated mass outsourcing of touchy data with set of rules implemented can be perniciously genealogy for money related advantages. 4. A legal system is too expensive for distinguishing methods. 3. OUR CONTRIBUTIONS In this venture we characterize LIME technique (Lineage in Malicious Environment)topersonalitytheliableparty.Inthis strategy wedole out an obviously characterize administer to each included gathering and force the between connections between these parts. Three distinct parts are information supplier, information buyer (outsider), and examiner. The information supplier part is to keep up the archives (images).The information purchaser (outsider) gets the record and furthermore forward the report to another outsider. Reviewer is conjured when aspillageishappens,heisjust mindful to discover a spillage (blameworthygathering).Heis summoned by a proprietor and gave the spilled information. The spilled information was assessed by examiner utilizing LIME and in this technique, there is distinguishing data implanted for every customer who got the information. Undetectable watermarking is done utilizing stenography in each outsourced picture. Utilizing this data the evaluatorcan make a genealogy, by cross checking and he discovers the leaker. The proposed model of this project isas showninthefigure1 which consists of four main phases as follows,  Data Upload and Outsource Request.  Accepting Request and watermarking Method.  Access Control and Forwarding Data.  Data Lineage method. Data Upload and Outsource Request In this module every association needs to enlist and transfer a few records like picture,isinchargeofdealingwith the archives. The customer (outsider) picks the supplier and gets the supplier's picture list. Purchasers pick the pictures which one he needs and give the demand to particular supplier. 4. SYSTEM ARCHITECTURE Accepting Request and watermarking Method Wheninformationsupplierloginwithhisqualificationshe can see thedemandnoticesandcanacknowledgethedemand or leave as it seems to be. In the wake of tolerating the demand, then the archives to be send is watermarked. Here strong watermarking technique is utilized which utilizes stenographicstrategytoinstallthedata.Theimplanteddata's are purchasername,suppliernameandfilename.Thesethree data's are changed to mark utilizing HMAC calculation. The entire data is scrambled utilizing RSA calculation .The encoded data is inserted intothepicture.Masswatermarking is done which is prepared for outsourcing.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1705 Access Control and Forwarding Data Get to Control Mechanism is to limit the buyer to forward the records that is how frequently the archivescanbeexchanged to another purchaser (outsider). So client can't forward the records to numerous outsiders.Afterlimitation,thepictureis forward to that asked for purchaser. Customer login with his certifications he/she can see the picture. Data lineage Method Get to Control Mechanism is to limit the buyer to forward the records that is how frequently the archives can be exchanged to another purchaser (outsider). So client can't forward the records to numerous outsiders. After limitation, the picture is forward to that asked for purchaser. Customer login with his certifications he/she can see the picture. The reviewer at first takes the proprietor as the flow presume sends the spilledarchivetotheebbandflowsuspect and requests that he give thedecodingkeytothewatermarks in this record. Utilizing the key, reviewer can decode the report .Thebuyer name is enlisted clientthenthecustomeris trusted. In the event that client is not enlisted client, the implanted data length will fluctuate, then evaluator adds the genealogy in shopper .After cross check between the presumes a definitive leaker of the picture is recognized. 5. RELATED WORKS 1. Shafi Goldwasser, Silvio Micali And Ronald L. Rivest in 1988. Present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the work of fiction property of being healthy alongside an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the autograph of beforehand preferred communication) cannot afterward create the autograph of even a single additional message. This may be somewhat surprising, since in the folklore the possessions ofencompassfalsificationindividual corresponding to factoring and organism unassailable to an adaptive chosen-message attack were considered to be contradictory. More generally, we show how to assemble a mark system with such belongings bottom on the continuation of a "claw-free" pair of permutations--a potentially weaker assumption than the intractability of numeral factorization. The new method is potentially practical:signingandverifyingsignaturesarereasonablyfast, and signatures are compact. 2. Zhiyong Zhang in 2011, Progressive and dynamic developments in the digital content industry are significantly dependent on copyright protection. Successful use control advances can ensure that end purchasers can lawfully get to, exchange, and share copyrighted substance and relating computerized rights. From thespecializedandadministrative points of view, we give a wide review on cutting edge of Digital Rights Management (DRM) frameworks. This paper begins with a non specific DRM biological system that adequately underpins two run of the mill application situations, and the environment assembles multi-partner trust and amplifies chance administration openings. And furthermore, an all encompassing and far reaching examination of use control models, approaches, and component were made in detail. These incorporate, yet are not constrained to, different correlations of rights expression dialects, security models, approval administration, rights exchange, and dependable use of secure end-client computerized gadgets or purchaser hardware.Atlast,ascope of open issues and difficulties for DRM biological systems are highlighted. An assortment of controllable and traceable rights sharing among e-clients, in blend with security hazard administration, will be the key for rising informal organization administrations. 3. Emil Praun Hugues Hoppey Adam Finkelstein Princeton, We describe a robust method for watermarking triangle meshes. Watermarking gives a component to copyright assurance of computerized media by implanting data distinguishing the proprietor in the information. The greater part of the examination on advanced watermarks has concentrated on media, for example, pictures, video, sound, and content. Powerful watermarks must have the capacity to survive an assortment of "assaults", including resizing, trimming, and separating. For strength to such assaults, late watermarking plans utilize a"spread-range" approach– they change the archive to the recurrence area and annoy the coefficients of the perceptually most huge premisecapacities. We extend this spread-range way to deal with work for the hearty watermarking of discretionary triangle networks. Summing up spread range methods to surfaces presents two noteworthy difficulties. To start with, self-assertive surfaces do not have a characteristic parametrization for recurrence based decay. Our answer is to build an arrangement of scalar premise work over theworkverticesutilizingmultiresolution investigation. The watermark irritates vertices along the heading of the surface ordinary, weighted by the premise capacities. The second test is that rearrangements and different assaults may adjust the network of the work. We utilize a streamlining procedure to resample an assaulted work utilizing the first work availability. Comes about demonstrate that our watermarks are impervious to normal work operations, for example, interpretation, revolution, scaling, editing, smoothing, disentanglement,andresampling, also asmalicious assaults, for example, the addition of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1706 commotion, change of low-request bits, or even inclusion of different watermarks. 4. David Megı´as, Josep Domingo-Ferrer, Multicast dissemination of substance is not suited to content-based electronic business sinceallpurchasersacquiretheverysame duplicate of the substance, in a manner that unlawful redistributors can't be followed. Unicast circulation has the deficiency of requiring one association with every purchaser, except it permits the vendor to install an alternate serial number in the duplicate acquired by every purchaser, which empowers redistributor following. Peer-topeer (P2P) circulation is a third alternative which may join a portion of the benefits of multicast and unicast: from one viewpoint, the vendor just needs unicast associations with a couple seed purchasers, who assume control over the errand of further spreading the substance; then again, if a legitimate fingerprinting component is utilized, unlawful redistributors of the P2P-dispersed substance can even now be followed. In this paper, we propose a novel fingerprinting system for P2P content dissemination which permitsredistributorfollowing, while saving the security of most legitimate purchasers and offeringconspiracyresistanceandpurchaserframeproofness. 5. Karen Su, Deepa Kundurand Dimitrios Hatzinakosin2005, In this paper, we display a hypothetical structure for the straight intrigue investigation of watermarked advanced video groupings, and determine another hypothesis comparing a meaning of factual intangibility, plot resistance, and two down to earth watermark configuration rules. The proposed structure is basic and instinctive; the essential preparing unit is the videoedgeandweconsidersecondorder measurable portrayals of their worldly between connections. Inside this expository setup, we characterize the straight casing conspiracy assault, the scientific idea of a measurably imperceptiblevideowatermark,anddemonstratethatthelast is a compelling counterattack against the previous. At long last, to show how the hypothetical outcomes nitty gritty in this paper can undoubtedly be connected to the development of plot safevideo watermarks, weexemplify the investigation into two pragmatic video watermark configuration decides that assume a key part in the consequent improvement of a novel arrangement safe video watermarking calculation talked about in a partner paper. Algorithms  HMAC algorithm  RSA algorithm  LIME algorithm Enhancement o In this venture we upgraded watermarking utilizing stenography technique. o Creating information as a mark utilizing HMAC calculationand furthermoreencodethe information utilizing RSA calculation. o Bulk Outsourcing is to be finished 6. CONCLUSIONS WeexhibitLIME,amodelforresponsibleinformation exchange over different substances. We characterize taking part parties, their interrelationships and give a solid instantiationforaninformationexchangeconventionutilizing vigorous watermarking and computerized marks. We discover leaker in malignant environment utilizing information heredity strategy. 7. REFERENCES [1] S. Goldwasser, S.Micali , and R .L. Rivest ,”A digital signature scheme secure against adaptive chosen- message attacks,” SIAM J . Comput. , Vol.17. [2] Emil Praun_Hugues Hoppey Adam Finkelstein Princeton University,“Robust mesh watermarking ,”IEEETransactions on multimedia vol.10 Issue 8 Dec-2008. [3] Karen Su,Deepa Kundur and Dimitrios Hatzinakos,”Statistical invisibility for collusion resistant digital video watermarking,”IEEE Transactions on multimedia,vol.7,No.1,Feb-2005. [4] A. Mascher-Kampfer, H. St ¨ogner, and A. Uhl, “Multiple re-watermarking scenarios,” in Proceedings of the 13th International Conference on Systems, Signals, andImageProcessing(IWSSIP 2006). Citeseer, 2006, pp. 53–56. [5] P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 1, pp. 51–63, 2011. [6] “Pairing-Based Cryptography Library (PBC),” http://crypto.stanford.edu/pbc. [7] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” Image Processing, IEEE Transactions on, vol. 6, no. 12, pp. 1673–1687, 1997. [8] B. Pfitzmann and M. Waidner, “Asymmetric fingerprinting for larger collusions,” in Proceedings of the 4th ACM conference on Computer and communications security, ser. CCS ’97, 1997, pp. 151– 160.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1707 [9] S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM J. Comput.vol. 17, no. 2, pp. 281–308, 1988. [10] A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, “A computational model for watermark robustness,” in Information Hiding. Springer, 2007, pp. 145–160. [11] J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon,R. E. Tarjan, and F. Zane, “Resistance of digital watermarks to collusive attacks,” in IEEE International Symposium on Information Theory, 1998, pp. 271–271. [12] M. Naor and B. Pinkas, “Efficient oblivious transfer protocols,” in Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, 2001, pp. 448–457. [13] “GNU Multiple Precision Arithmetic Library (GMP),” http://gmplib.org/. [14] D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” in AdvancesinCryptology-ASIACRYPT 2001. Springer, 2001, pp. 514–532. [14] W. Dai, “Crypto++ Library,” http://cryptopp.com. [15] P. Meerwald, “Watermarking toolbox,” http://www.cosy.sbg.ac.at/_pmeerw/Watermarking/source. [16] Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, “Extending oblivious transfers efficiently,” in Advances in Cryptology-CRYPTO 2003. Springer, 2003, pp. 145–161. [17] M. Backes, N. Grimm, and A. Kate, “Lime: Data lineage in the malicious environment,” in Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings, 2014, pp. 183–187. [18] R. Hasan, R. Sion, and M. Winslett, “The case of the fake picasso: Preventing historyforgery withsecure provenance,”inFAST, 2009, pp. 1–14. [19] A. Pretschner, M. Hilty, F. Sch¨utz, C. Schaefer, and T. Walter, “Usage Control Enforcement: Present and Future,” IEEE Security & Privacy vol. 6, no. 4, pp. 44–53, 2008. [20] F. Kelbert and A. Pretschner, “Data usage control enforcement in distributed systems,” in CODASPY, 2013, pp. 71–82. [21] F. Salim, N. P. Sheppard, and R. Safavi-Naini, “A Rights Management Approach to Securing Data Distribution in Coalitions,” in NSS, 2010, pp. 560–567. [22] N. P. Sheppard, R. Safavi-Naini, and P. Ogunbona, “Secure multimedia authoringwithdishonestcollaborators,” EURASIP J. Appl. Signal Process., vol. 2004, pp. 2214–2223, 2004. [23] G. S. Poh, “Design and Analysis of Fair Content Tracing Protocols,” Ph.D. dissertation, 2009. R. Petrovic and B. Tehranchi, “Watermarkinginanencrypted domain,” Jul. 7 2006, uS Patent App. 11/482,519. [24] R. Anderson and C. Manifavas, “Chameleon - A newkind of stream cipher,” in Fast SoftwareEncryption.Springer,1997,pp.107– 113. [25] A.-R. Sadeghi, “Secure fingerprinting on sound foundations,” Ph.D. dissertation, 2004. [26] J. Domingo-Ferrer,“Anonymousfingerprinting based on committed oblivious transfer,” in Public Key Cryptography. Springer, 1999, pp. 43–52. [27] A.-R. Sadeghi, “How to break a semi-anonymous fingerprinting scheme,” in Information Hiding.Springer,2001,pp.384–394.