ABSTRACT
Anonymous
fingerprint has been suggested as a convenient solution for the legal
distribution of multimedia contents with copyright protection whilst preserving
the privacy of buyers, whose identities are only revealed in case of illegal
re-distribution. However, most of the existing anonymous fingerprinting
protocols are impractical for two main reasons: 1) the use of complex
time-consuming protocols and/or homomorphic encryption of the content, and 2) a
unicast approach for distribution that does not scale for a large number of
buyers. This paper stems from a previous proposal of recombined fingerprints
which overcomes some of these drawbacks. However, the recombined fingerprint
approach requires a complex graph search for traitor tracing, which needs the
participation of other buyers, and honest proxies in its P2P distribution
scenario. This paper focuses on removing these disadvantages resulting in an
efficient, scalable, privacy-preserving and P2P-based fingerprinting system.
AIM
The
aim of this paper is the recombined fingerprint approach requires a complex
graph search for traitor tracing, which needs the participation of other
buyers, and honest proxies in its P2P distribution scenario.
SCOPE:
The
Scope of this paper focuses on removing these disadvantages resulting in an
efficient, scalable, privacy-preserving and P2P-based fingerprinting system.
EXISTING SYSTEM
Most
fingerprinting systems can be classified in three categories, namely symmetric,
asymmetric and anonymous schemes. In symmetric schemes, the merchant is the one
who embeds the fingerprint into the content and forwards the result to the
buyer; hence, the buyer cannot be formally accused of illegal redistribution,
since the merchant also had access to the fingerprinted content and could be
responsible for the redistribution. In asymmetric fingerprinting, the merchant does
not have access to the fingerprinted copy, but he can recover the fingerprint
in case of illegal re-distribution and thereby identify the offending buyer. In
anonymous fingerprinting, in addition to asymmetry, the buyer preserves her
anonymity (privacy) and hence she cannot be linked to the purchase of a
specific content, unless she participates in an illegal re-distribution.
Anonymous fingerprinting is, thus, the most convenient strategy to protect both
the buyers’ privacy and the owner’s rights, since it guarantees the following
properties: 1) only the buyer obtains the fingerprinted copy of the content,
making it impossible for the merchant to accuse her of unlawful
re-distribution, and 2) it preserves the anonymity of the buyers’ identities
with respect to the merchant
DISADVANTAGES
- The use of complex time-consuming protocols and/or homomorphic encryption of the content,
- A unicast approach for distribution that does not scale for a large number of buyers.
PROPOSED
SYSTEM
This
paper reviews the main features of the proposal suggested in highlights its main drawbacks, and suggests
several significant improvements to achieve a more efficient and practical
system, especially as traitor tracing is concerned, since it avoids the
situations in which illegal re-distributors cannot be traced with the proposal
of Furthermore, better security
properties against potentially malicious proxies are obtained. Although the
system proposed in this paper uses public-key encryption in the distribution
and traitor tracing protocols, it must be taken into account that this
encryption is only applied to short bit strings, such as the binary
fingerprints and hashes, not to the content. The fragments of the content are
encrypted using symmetric cryptography, which is much more efficient.
ADVANTAGES
- Efficient and scalable distribution of multimedia contents in P2P networks.
- Avoidance of (complex) homomorphic (or any type of public-key) encryption of the multimedia content.
SYSTEM CONFIGURATION
HARDWARE REQUIREMENTS:-
· Processor - Pentium –III
·
Speed - 1.1 Ghz
·
RAM - 256 MB(min)
·
Hard
Disk - 20 GB
·
Floppy
Drive - 1.44 MB
·
Key
Board - Standard Windows Keyboard
·
Mouse - Two or Three Button Mouse
·
Monitor -
SVGA
SOFTWARE REQUIREMENTS:-
·
Operating
System : Windows 7
·
Front
End : JSP AND SERVLET
·
Database
: MYSQL
·
Tool :NETBEANS
REFERENCE
Megias,
D ,“ Improved
Privacy-Preserving P2p Multimedia Distribution Based On Recombined Fingerprints,”
IEEE Transactions on Dependable and Secure Computing, Volume 12 Issue 2 , April 2014.
No comments:
Post a Comment