peer-to-peer hypermedia sharing built on recombined thumbprints

Swetha,Suganya,Anitha Moses,Kajendran

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:1         Year: 25 April,2015         Pages:149-153

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

Thumbprinting emerged as a technological solution to avoid illegal content re-distribution. Anonymous fingerprint is a solution for legal distribution of multimedia contents with copyright protection. The identities of buyer are revealed only in case of illegal redistribution. Some of the problems in the existing fingerprint protocols are 1) use of complex time-consuming protocols and/or homomorphic encryption of the content, and 2) a unicast approach for distribution that does not scale for a large number of buyers. Recombined fingerprints methodology is used. Proposed system is efficient, scalable, privacy-preserving and P2P based fingerprinting system. The multimedia file is distributed in the peer-peer networks. The main work of the process is to identify any misuse of multimedia copies along the peer-peer network. The recombined fingerprint are used for unique identification of the merchant and buyers. Finally evaluate the

Kewords

anonymous Thumbprinting, recombined Thumbprints, P2P contented sharing.

Reference

[1] J. Domingo-Ferrer and D. Meg´ıas, “Distributed multicast of fingerprinted content based on a rational peer-topeer community,”Computer Communications, vol. 36, pp. 542–550, Mar. 2013. [2] D. Meg´ıas and J. Domingo-Ferrer, “DNA-Inspired Anonymous Fingerprinting for Efficient Peer-To-Peer Content Distribution,”Proc. 2013 IEEE Congress on Evolutionary Computation (CEC2013), pp. 2376–2383, Jun. 2013. [3] R. O. Preda and D. N. Vizireanu, “Robust wavelet-based video watermarking scheme for copyright protection using the human visual system,” Journal of Electronic Imaging, vol. 20, pp. 013022–013022-8, Jan.-Mar. 2011. [4] C.-C. Chang, H.-C.Tsai, and Y.-P. Hsieh, “An efficient and fair buyer-seller fingerprinting scheme for large scale networks,”Computers & Security, vol. 29, pp. 269–277, Mar. 2010. [5] M. Kuribayashi, “On the implementation of spread spectrumfingerprinting in asymmetric cryptographic protocol,” EURASIPJournal on Information Security, vol. 2010, pp. 1:1–1:11, Jan. 2010. [6] S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M.Maas, “A buyer-seller watermarking protocol based on secure embedding,” IEEE Trans. on Information Forensics and Security,vol. 3, pp. 783–786, Dec. 2008. [7] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Burlington MA: MorganKaufmann, 2008. [8] J. P. Prins, Z. Erkin, and R. L. Lagendijk, “Anonymous fingerprinting with robust QIM watermarking techniques,” EURASIP Journal on Information Security, vol. 2007, pp. 20:1–20:7, Dec. 2007. [9] Y. Bo, L. Piyuan, and Z. Wenzheng, An efficient anonymous fingerprinting protocol. Computational Intelligence and Security,LNCS 4456, Springer, pp. 824–832, 2007. [10] C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing, vol. 13, pp. 1618–1626, Dec. 2004. [11] J. Camenisch, “Efficient anonymous fingerprinting with group signatures,” Asiacrypt 2000, LNCS 1976, Springer, pp