Copyright Protection for Multimedia Content on Cloud (original) (raw)
Related papers
Survey: Multimedia Copyright Protection on Cloud
IARJSET, 2017
The Internet regarded as an amorphous omnipresent space for processing and storage is called as Cloud computing. In other words Cloud Computing is defined as operations which are based on internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. A legal way of protecting user's data which means that data the user has created and uploaded cannot be published by anyone except the user without his permission is Multimedia copyright protection on cloud. The development of Internet has led the multimedia computing to emerge as a technology for generating, editing, processing and searching contents of media like image, audio, video, graphics and such others. Multimedia cloud computing has much challenges like Network heterogeneity, Device heterogeneity , Multimedia and service heterogeneity, Security, Power Consumption, QoS heterogeneity which has to be met. Besides this there is a big challenge for data security and access control when the user uploads any data in the form of multimedia content for sharing on cloud. In this paper we can see detection of copyright violation of multimedia content like images and videos. This paper proposed a new method of creating and comparing signatures of data on cloud. This paper travel through a method for enhancing security for copyright protection of multimedia content like images and videos.
A Novel Approach to Security System of Multimedia Contents Protection for Cloud Computing
International Journal for Research in Applied Science & Engineering Technology, 2021
The planned multimedia system Content Protection System For Cloud Computing, novel approach for securing a multimedia system contents. The system supports a value potency, quick development, deployment, measurability and snap for accomplishment feat on a cloud infrastructure this method will used a for shielding a special forms of transmission contents variety of a audio file, 2D video, 3D Video, images, songs, music files. Achieving a security system follows a combine of levels 1) Creates a signatures of a 3D videos 2) Distributed matching Engine for transmission objects. for each transmission objects a separate signature square measure planning to be created and this method creates a durable and representative signatures for the 3D Videos ,that checks the content by content to hunt out modified copy .The second level Distributed matching Engine have a high quality and it's designed to support for various types of multimedia system objects. Of 3D videos, whereas our system detects quite ninety eight of them. This comparison shows the need for the planned 3D signature technique, since the progressive industrial system wasn't able to handle 3D videos The system can run on personal clouds, public clouds, or any combination of public-private clouds projected system is ascendable and value effective and relates to the detection of copied and changed material practice cloud systems, and a lot of considerably to a system and in an internet setting for the detection of duplicated, copyright material. Keywords: Signature, 3D, 2D, Distributed Matching Engine I. INTRODUCTION Advances in technique and recorder of transmission content additionally as a results of the show of free crawler. we've developed a full running system of all on-line hosting sites have created it comparatively straightforward to duplicate proprietary materials like videos, images, and music clips. Illegally redistributing transmission content over internet could computationally valuable operation, due to the sheer volume of the offered transmission content over the net and therefore the quality of comparison content to spot copies. we tend to current a unique system for transmission content protection on cloud infrastructures. The system is typically accustomed to secure varied transmission. content varieties, besides regular second videos, new 3D videos, images, audio clips, songs, and music clips. The system will run on personal clouds, public clouds, or any combination of public-private clouds. Our models achieve speedy preparation of content protection systems, as a result of its supported cloud infrastructures which can quickly offer computing hardware and package resources. the planning is worth effective as results of it uses the computing resources on demand. the design square measure scaled up and right all the way down to support varying amounts of transmission content being protected. The planned system is fairly refined with multiple elements, including (i) Crawler to transfer thousands of transmission objects from on-line hosting sites, (ii) Signature technique to make representative fingerprints from transmission objects, and (iii) distributed matching engine to store signatures of original objects and match them against inquiry objects. We've proposed novel ways in which within which for the second and third components, that we tend to utilize ready-made tools for the elements and tested it with over eleven,000 3D videos and a million photos. we tend to deployed components of the system on the Amazon cloud with a varied vary of machines (from eight to 128), and additionally, the fully totally different components of the system were deployed on our personal cloud. This preparation model was accustomed show the physical property of our system, which allows it to with efficiency utilize varied computing resources and minimize the price since cloud suppliers supply altogether fully totally different rating models for computing and network resources. Through full experiments with real find yourself in a very important loss of revenues for content creators. Finding illegally-made copies over information superhighway can be an advanced and preparation, we've shown the high accuracy (in terms of exactness and recall) likewise as a result of the quality and property of the planned system
A Survey on Multimedia Content Protection Mechanisms
International Journal of Electrical and Computer Engineering (IJECE), 2018
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
A Survey on Multimedia Content Protection
To provide rich media services, multimedia computing has emerged as a noteworthy technology to generate, edit, and search media contents, such as images, graphics, video, audio, and so on. Due to tremendous evolution in Internet technologies and multimedia, content copying has become quite effortless. This paper reviews brief literature on multimedia data security over the cloud and multimedia content protection in terms of copy detection.
Novel System for Multimedia Content Protection on Cloud Infrastructures
In this paper, we propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including 2-D videos, 3-D videos, images, audio clips, songs, and music clips. The system can be deployed on private and/or public clouds. Our system has two novel components: (i) method to create signatures of 3-D videos, and (ii) distributed matching engine for multimedia objects. The signature method creates robust and representative signatures of 3-D videos that capture the depth signals in these videos and it is computationally efficient to compute and compare as well as it requires small storage. The distributed matching engine achieves high scalability and it is designed to support different multimedia objects. We implemented the proposed system and deployed it on two clouds: Amazon cloud and our private cloud. Our experiments with more than 11,000 3-D videos and 1 million images show the high accuracy and scalability of the proposed system. In addition, we compared our system to the protection system used by YouTube and our results show that the YouTube protection system fails to detect most copies of 3-D videos, while our system detects more than 98% of them. This comparison shows the need for the proposed 3-D signature method, since the state-of-the-art commercial system was not able to handle 3-D videos. This work is implemented using .net tool.
CLOUD-BASED MULTIMEDIA CONTENT COPY DETECTION SYSTEM
Web has million of multimedia contents such as videos and images. It may happen that each and every multimedia content has duplicated copies. There are lots of mechanism available that provides easy way for editing, publishing or uploading multimedia contents so that it may leads to security problem and also reduplicating the identity of content owner and also loss of revenue to the content owner. So that this system can be used to protect the Illegally redistributed multimedia contents such as 3D videos or images. The main goal of this system is to provide cost efficiency ,rapid development ,scalability and elasticity to accommodate varying workloads and improve the accuracy as well as computational efficiency and also the reliability. This system can be deploy on public cloud. And this System show high accuracy for more than 11,000 videos and one million of images. INTRODUCTION Now a days, multimedia contents and availability of free online hosting sites have made it easy to duplicating copyrighted material, like images and videos for finding Illegally made copies over internet is complex. In this system, there are three methods which are present first are Crawler to downloads the multimedia contents, Signature creation method for downloaded multimedia contents, Distributed matching engine to match the multimedia contents. This system can be deployed on public cloud. It is helpful for all content owner and also public cloud supports the different multimedia contents. This can be used to utilize the computing resource on their demand. The contribution of this paper are as follows Parallel crawler to downloads thousands of multimedia contents from various online hosting sites. The 64-bit division algorithm can be used to create signature.This method create signature based on the downloaded multimedia contents. The signature is in the form of character and numbers .This created signature is stored in distributed index.Another method to match the match the signature which is stored in distributed index. The Depth first search algorithm is used to matching multimedia contents. The reference signature and query signature is compared or matched with each other, If this signature is matched in distributed index then the system gives notification to content owner and malicious user and if signature is not matched then through reference register it stored in distributed index.
An Approach to Enhance Multimedia Security in Cloud Computing
Nowadays multimedia has turn out to be essential in every domain for its quality. On the other hand, due to the problems of handling petabytes of such kind of multimedia data in words of calculations, sharing, communications, as well as stowage, there is a rising request of a substructure in the direction of having on-request admission towards a distributed group of configurable calculating assets. Cloud computing is the newest rebellion in IT industry which is fundamentally connected to the budget. The increasing amount of applications as well as the quantity of data which also essential to be accomplished has prepared information centers in the direction of turn out to be an significant as well as indispensable venture in addition to public cloud calculating give the impression to be a way in the direction of controlling these prices as well as their securities. The amalgamation of multimedia as well as cloud for security enhances many technical issues for numerous media-rich applications. In multimedia, there are various types of it such as audio, video, text, image etc. But in our work, we have utilized three kinds of multimedia data i.e. Text, Audio and Image data. In this paper, our main focus is on multimedia security in cloud computing. In our proposed work, we have utilized RSA, DES and Two Fish Algorithm to get inverted data. And also we have used genetic Algorithm for optimization purpose and to classify we have utilized neural network classifier. We have used parameter Mean Square Error and Signal-Noise-Ratio to evaluate our results as well as used these parameters to compare with existing work done by researchers. The over-all work is done and accomplished in MATLAB 7.10 environment.
Copyright protection of multimedia documents: From theory to application
1999
Transmission, manipulation and storage of images in digital format is rapidly becoming an everyday practice. Desktop publishing, digital libraries, image databases and the World Wide Web are only some of the application areas that are strongly related to digital imaging technology. The new digital, networked environment necessitates the development of robust and trustworthy encryption, authentication and copyright protection techniques. In this paper we describe a general framework for image copyright protection through image watermarking. In particular we present the main features of an e cient watermarking scheme, discuss robustness issues and describe the three main stages of a watermarking algorithm namely watermark generation, embedding and detection.
An Efficient Method for Protecting Hypermedia & Reducing Computation Cost Using Cloud Resources
Now-a-days rich hypermedia content is uploaded to different sites but patent resources such as record, song and similes are hosted in sites which fatalities the proceeds of at ease creators for this problem. We recommend new design to protect hypermedia content by utilizing cloud resources which minimizes outlay, scalability and stretch. The new system is a collection of public cloud and private cloud. The designed new system contains two important components one is efficient method to create signatures of 3D-videos which captures the intensity sign of 3D videos lacking of computing the exact deepness map, which is computationally it is an exclusive process. The second is distributed Matching Engine which is used to make out duplicate hypermedia object, between the creative one and the alleged one. To overcome this problem, we have designed an Index R++ tree. In this the object of signatures will be maintained and it offers best efficiency signatures are to be protected, finally this new method shows efficiency in terms of identification duplicate hypermedia objects reduces communication and totaling cost.
COMPREHENSIVE REVIEW ON MULTIMEDIA CLOUD COMPUTING
Mostly of our information is deposited on local network systems using servers which might be grouped and sharing storage. This method has required a lot of time period to be established into established design, as well as offers quite low redundancy when deployed right. As a fresh revolving technology i.e. cloud computing, has displayed up huge challenging consideration as well as speedily is changing the direction of the technology landscape. In our work we have workedusing enhanced approach of security of the content which is going to be stored at cloud computing platform. Nowadays the cloud computing is a new-fangled space which we all anticipating to be safe and secure. Nevertheless we would not overlook the future phases of the hacking frameworks as well as their methodologies. By keeping the future aspects in mind our work has distributed the data into distinctive server stages so that in any condition if some body attempts to acquire the information, that person might have to access all the platforms provided for the data storage. This paper audits the brief study on multimedia cloud computing perspectives and described some challenges, some security issues in cloud computing, along with security algorithms.