A Survey on Multimedia Content Protection

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 05 | May -2017

p-ISSN: 2395-0072

www.irjet.net

A Survey on Multimedia Content Protection Supriya A V1, Prof. Sudheer Shetty2 1M.Tech,

Dept.of CSE, Sahyadri College of Engg. & Management, Mangaluru, Karnataka, India & HOD, Dept.of CSE, Sahyadri College of Engg. & Management, Mangaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------2. RELATED WORK Abstract - To provide rich media services, multimedia 2Professor

computing has emerged as a noteworthy technology to generate, edit, and search media contents, such as images, graphics, video, audio, and so on. Due to tremendous evolution in Internet technologies and multimedia, content copying has become quite effortless. This paper reviews brief literature on multimedia data security over the cloud and multimedia content protection in terms of copy detection. Key Words: Multimedia, Content protection, Digital Signature, Watermarking, Hashing, Content Based Copy Detection, Cloud computing

1. INTRODUCTION There are a number of data types in use today that can be characterized as multimedia data types. These are the elements used for the building blocks of other generalized multimedia environments, platforms, or integrating tools. The basic types can be described as follows: Images: There is great variance in the quality and size of storage for still images. Digitalized images are sequence of pixels that represents a region in the user's graphical display. The space overhead for still images varies on the basis of resolution, size, complexity, and compression scheme used to store image. The popular image formats are jpg, png, bmp, tiff. Audio: An increasingly popular data type being integrated in most of applications is Audio. It is quite space intensive. One minute of sound can take up to 2-3 Mbs of space. Several techniques are used to compress it in a suitable format. The popular audio formats are mp3, wma, wav, ogg. Video: One on the most space consuming multimedia data type is digitalized video. The digitalized videos are stored as sequence of frames. Depending upon its resolution and size, a single frame can consume up to 1 MB. Also, to have a realistic video playback, the transmission, compression, and decompression require continuous transfer rate. The popular video formats are mp4, wmv, mov, avi, flv. Advancements in multimedia content creation, recording, processing, its growing popularity and free web hosting facilities resulted in easy duplication of copyrighted contents such as images, audio clips and videos. Illegitimately redistributing such protected content over Internet causes revenue loss for content owners. Such copies also consume significant memory on the storage. Š 2017, IRJET

|

Impact Factor value: 5.181

|

There is a requirement to protect multimedia data of various types over the cloud, from the point of academic world and business. Number of studies showing the need of security in cloud computing especially for the multimedia content storage and the various proposed techniques to enhance security. Research is being carried out in this regard from past decade. Er.Shilpi Harnal et al.[1] explained about multimedia supported cloud environment, necessity and challenges in such an environment for rich multimedia communication and computation. They did a survey of different multimedia cloud computing architectures, security and other issues and possible solutions proposed by various authors. Wenwu Zhu et.al [2] presented the basic concept and a novel framework of multimedia cloud computing. They addressed multimedia cloud computing from two perspectives which are multimedia-aware cloud and cloudaware multimedia. Chun-Ting Huang [3] conducted a detailed survey on recent multimedia storage security research activities in association with cloud computing. They concentrated on four hot research areas which are data integrity, data confidentiality, access control, and data manipulation in the encrypted domain. Prassanna J et al.[4] analyzed an innovative mechanism that technically and systematically logging any data access stored in the cloud along with well supported auditing mechanism using Cloud Information Accountability (CIA) framework. It utilized the homomorphic linear authenticator (HLA) and stochastic masking to promise that the third party audit would not be able to discover any information about the user’s precious data or informational content stored on the cloud data storage. Swapnali More et al. [5] proposed a secure and efficient privacy preserving public auditing scheme. This auditing scheme makes use of Advanced Encryption Standard (AES) algorithm for encryption, Secure Hash Algorithm-2 (SHA-2 )for integrity check and RSA signature for digital signature calculation. Amna Qureshi et al. [6] presented a study of media content protection and its impact on end user privacy. Paper also discussed about recent proposals of Peer-To-Peer(P2P) ISO 9001:2008 Certified Journal

|

Page 71


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
A Survey on Multimedia Content Protection by IRJET Journal - Issuu