CLOUD-BASED MULTIMEDIA CONTENT PROTECTION USING MATCHING OBJECT

SEEE DIGIBOOK ON ENGINEERING & TECHNOLOGY, VOL. 01 (2), JUN 2020 PP. (727-731)
Abstract– We would like to present an innovative concept for the protection of extensive amounts of multimedia content. In order to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads, our design makes use of cloud infrastructures. The system that is being proposed is capable of protecting a wide variety of multimedia content formats, including 2-D videos, 3-D videos, images, audio clips, songs, and music clips, among others. The application can be run in either a private or public cloud environment. Our system is distinguished by the presence of two innovative components: I a method for the creation of signatures for 3-D videos, and (ii) a distributed matching engine for multimedia objects. The signature method produces reliable and representative signatures of three-dimensional videos. These signatures capture the depth signals contained within the aforementioned videos, and the method is computationally efficient, as well as requiring little storage space, and it creates these signatures. The distributed matching engine is designed to support a wide variety of multimedia objects, and it is capable of achieving high levels of scalability. We put the proposed system into action by implementing it and deploying it on two clouds: the Amazon cloud and our own private cloud. The proposed system was tested with over one million images and eleven thousand thousand three dimensional videos, and the results demonstrated both its high level of accuracy and its scalability. In addition, we compared our system to the protection system that is used by YouTube, and the results show that the protection system used by YouTube is unable to detect the majority of copies of 3-D videos, whereas our system is able to detect more than 98 percent of those copies. This comparison demonstrates that there is a need for the proposed 3-D signature method because the most advanced commercial system available at the time was unable to process 3-D videos.
Index Terms – 3D video, cloud applications, depth signatures, and video cop
REFERENCE

Hefeeda, M., ElGamal, T., Calagari, K. and Abdelsadek, A., 2015. Cloud-based multimedia content protection system. IEEE transactions on multimedia, 17(3), pp.420-433.
Bindu, G.H., Anuradha, C. and Chandra Murthy, P.S.R., 2018. A survey on multimedia content protection mechanisms. International Journal of Electrical and Computer Engineering (IJECE), 8(6), p.4204
Sangeetha, S., CONTENT PROTECTION SYSTEM USING MATCHING OBJECT FOR CLOUD BASED MULTIMEDIA.
SATISHKUMAR, D., JEEVANANTHAM, M.G., GNANAKUMARI, M.R., SIVAKUMAR, M.A. and KALEESWARAN, M.D., CONTENT PROTECTION SYSTEM USING MATCHING OBJECT FOR CLOUD BASED MULTIMEDIA.
Arnold, M., Schmucker, M. and Wolthusen, S.D., 2003. Techniques and applications of digital watermarking and content protection. Artech House.
Huang, T., Tian, Y., Gao, W. and Lu, J., 2010. Mediaprinting: Identifying multimedia content for digital rights management. Computer, 43(12), pp.28-35.
Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L. and Delp, E.J., 2005. Advances in digital video content protection. Proceedings of the IEEE, 93(1), pp.171-183.
Xu, Q., Guo, J. and Xiao, B., 2012. The study of content security for mobile internet. Wireless Personal Communications, 66(3), pp.523-539.
Lu, C.H., Chang, F.C. and Hang, H.M., 2006, October. A CONTENT PROTECTION SCHEME USING MPEG-21 CONCEPTS AND TOOL. In Europe-China Conference on Intellectual Property in Digital Media (IPDM06).
SUVARTHA, S., Haze-Constructed Hypermedia Comfortable Security Structure.
Xu, D., Xie, H. and Yan, C., 2017. Triple-bit quantization with asymmetric distance for image content security. Machine Vision and Applications, 28(7), pp.771-779.
Diehl, E., 2012. Securing digital video: techniques for DRM and content protection. Springer Science & Business Media.
Lian, S. and Zhang, Y., 2009. Protecting mobile TV multimedia content in DVB/GPRS heterogeneous wireless networks. J. Univers. Comput. Sci., 15(5), pp.1023-1041.


Ganeshkumar G, Arnald Russel A, Kaviya R, Sneha R, Swathika K
Department of Information Technology,
Rathinam Technical Campus,
Coimbatore, India

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top