Ownership Identification and Signaling of Multimedia Content Components

Authors

  • Sai Lakshman Ch. Final year student, Department of Data Science and Computational Intelligence, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tamil Nadu Author
  • Dr.Saravanan.M.S Professor, Department of Data Science and Computational Intelligence, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tamil Nadu. Author

DOI:

https://doi.org/10.61841/wyr0s174

Keywords:

Multimedia content, 3D videos, Images, Signature method, Amazon cloud

Abstract

We are proposing a new concept for large-scale, interactive content protection systems in this paper. Our architecture leverages cloud infrastructures to deliver cost-effectiveness and fast deployment with some additional attributes to improve the security of content. The framework proposed could be used to secure various forms of multimedia content, including 2-D videos, 3-D videos, photographs, audio clips, songs, and music clips. The content of the multimedia can be used in different approaches to implement security with various components such as videos, audio files, etc. These types of contents are deployed on private or public clouds. The signature method has the unique nature of 3D video representation with a signature-based approach. At the same time, efficient computational methods are used for depth signaling. With the high scalability and efficient methods to protect multimedia objects, in this paper we propose a signature-based approach using a cloud framework. 

Downloads

Download data is not yet available.

References

[1] E. Lin, A. Eskicioglu, R. Lagendijk, and E. Delp, “Advances in digital video content protection,” Proceedings of the IEEE, vol. 93, no. l, pp. 171-183, 200.

[2] I. Cox, M. Miller, J. Bloom, “Digital Watermarking,” Morgan Kaufmann Publishers, 2001.

[3] D. Zheng, Y. Liu, J. Zhao, and A. E. Saddik, “A survey of RST invariant image watermarking algorithm,” ACM Comput. Surv., vol. 39, no. 2, pp. 1-91, 2007.

[4] T. Huang, Y. Tian, W. Gao, and J. Lu, “Mediaprinting: Identifying multimedia content for digital rights management,” Computer, vol. 43, no. 12, pp. 28-35, 2010.

[5] Saravanan.M.S., A.R.Apoorva, ”Malicious attacks on private and public cloud networks and related issues," published in the International Journal of Applied Engineering Research by Research India Publications, India, Vol. 10, Issue. 33, May’ 2015, pp. 24584-24587, ISSN: 0973-4562.

[6] ISO/IEC 23009-1:2014, “Information technology -- Dynamic adaptive streaming over HTTP (DASH) --Part 1: Media presentation description and segment formats.”.

[7] L. Mou, T. Huang, L. Huo, W. Li, W. Gao, X. Chen. “A secure media streaming mechanism combining encryption, authentication, and transcoding.” Signal Processing: Image Communication, 24(10):825-833, 2009.

[8] Saravanan, M.S., ”Adaptive Prefetching of Multimedia Applications in Distributed Systems," Under Review to Publish in the Far East Journal of Mathematical Sciences by Pushpa Publishing House, India, ISSN: 0972-0871.

[9] Y. Bengio, A. Courville, and P. Vincent, “Representation learning: a review and new perspectives,” IEEE Trans. Pattern Anal. Machine Intell. 35, 1798-1828, 2013.

Downloads

Published

30.04.2020

How to Cite

Ch., S. L., & .M.S, S. (2020). Ownership Identification and Signaling of Multimedia Content Components. International Journal of Psychosocial Rehabilitation, 24(2), 5338-5346. https://doi.org/10.61841/wyr0s174